I received the following response from the Mozilla Security Group.
They are not aware of any remote exploit in the Mozilla's printing code.


---------- Forwarded message ----------
From: Daniel Veditz <[EMAIL PROTECTED]>
To: Jesse Ruderman <[EMAIL PROTECTED]>
Cc: security-group <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Date: Fri, 09 Jul 2004 00:17:27 -0700
Subject: Re: [Fwd: Mozilla postscript vulnerability?]

There are no confidential bugs that mention the word postscript anywhere. If
someone knows of an exploit they didn't bother to tell us about it.

Jesse Ruderman wrote:
> -------- Original Message --------
> Subject:      Mozilla postscript vulnerability?
> Date:         Wed, 7 Jul 2004 16:56:00 -0700 (PDT)
> From:         Matt Brubeck <[EMAIL PROTECTED]>
> To:   Jesse Ruderman <[EMAIL PROTECTED]>
>
> Jesse,
>
> There is some confusion on the Debian mailing lists about rumors of
> a remote code execution vulnerability in Mozilla's Postscript/default
> printing backend.  This caused the Mozilla and Firefox maintainers to
> build their Debian packages with --disable-postscript:
>
>   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=247585
>
> Now some Debian folks are trying to find out if this exploit really
> exists.  I wasn't able to find any relevant information in public
> Bugzilla reports or on the mozilla.org/projects/security web pages.
> Can you shed any light on this?
>
> Note: I also told the Debian GNOME team to contact [EMAIL PROTECTED]:
>
>   http://lists.debian.org/debian-gtk-gnome/2004/07/msg00027.html
>
>
>
> _______________________________________________
> Security-group mailing list
> [EMAIL PROTECTED]
> http://mail.mozilla.org/listinfo/security-group


Reply via email to