I guess if you really wanted to get fancy you could setup postscript rendering as 
service in a chrooted jail, so it doesn't really matter if anything runs as it will 
not have access to the OS file system or services.

Ian

-----Original Message-----
From: "Kevin B. McCarty" <[EMAIL PROTECTED]>
To: Ian Douglas <[EMAIL PROTECTED]>
CC: [EMAIL PROTECTED], [EMAIL PROTECTED], 
        [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Cite for print-to-postscript exploit in Mozilla?
Date: Fri Jul 09 14:18:51 GMT 2004

>On 07/09/2004 04:02 PM, Ian Douglas wrote:
>> http://www.imc.org/ietf-822/old-archive1/msg01346.html
>> 
>> Is probably what is being refered to...
>
>Thanks for the link!  (Wow, foreshadowing of virus infections via email
>attachments...)
>
>But is there any way in which Mozilla's print-to-postscript is _less_
>safe than using gv to open up a random PostScript file found somewhere
>on the Internet?  Or are the two equally insecure?  If the latter, then
>does it make sense to turn off postscript printing without also removing
>gv and other PS viewers from Debian?
>
>I admit this last question is a bit rhetorical.  My point is that, as
>sysadmin of a physics cluster running Debian/woody on which people
>frequently look at downloaded PS files anyway, I want to know whether it
>is really worth my time to upgrade Mozilla [currently running 1.4 from
>Adrian Bunk's backports], install Xprint from unstable, and go through
>the apparently non-trivial task of getting it to work well.
>
>By the way, is PDF also Turing-complete with the accompanying security
>issues?
>
>regards,
>
>-- 
>Kevin B. McCarty <[EMAIL PROTECTED]>   Physics Department
>WWW: http://www.princeton.edu/~kmccarty/    Princeton University
>GPG public key ID: 4F83C751                 Princeton, NJ 08544
>
>
>-- 
>To UNSUBSCRIBE, email to [EMAIL PROTECTED]
>with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
>

Reply via email to