Am 22.03.2013 00:56, schrieb Sam Varshavchik:
> Even let's hypothetically say there's an exploit in Firefox that can be used 
> to inject executable code, through a
> malicious web page, once running the code will have no way to overwrite 
> Firefox's binary executable, and implant
> itself in Firefox, or any other operating system executable. As soon as you 
> log out or reboot, it's gone. The scope
> of the damage is limited to wiping files in your home directory, and that's 
> about it

this as a very naive point of view
you do not need to change system-binaries

it is enough to place you executeable in the userhome, start
it with the desktop and let connect it to a remote-server to
have a shell and break any privacy of the user

how many users would recognize such intrusion?



Attachment: signature.asc
Description: OpenPGP digital signature

-- 
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org

Reply via email to