POP Security Review Action Items
Categories
(MailNews Core :: Networking: POP, defect)
Tracking
(Not tracked)
People
(Reporter: hjtoi-bugzilla, Unassigned)
References
Details
(Keywords: sec-audit, Whiteboard: [sg:audit])
Updated•22 years ago
|
Updated•20 years ago
|
Assignee | ||
Updated•16 years ago
|
Comment 1•13 years ago
|
||
Comment 2•13 years ago
|
||
Updated•13 years ago
|
Comment 3•3 years ago
|
||
perhaps good timing to review these items, given the pop update ?
Updated•3 years ago
|
Comment 4•2 years ago
|
||
(In reply to Wayne Mery (:wsmwk) from comment #3)
perhaps good timing to review these items, given the pop update ?
Redirecting to Ping who implemented POP in javascript in bug 1707548.
Comment 5•2 years ago
|
||
Regarding this bug, I don't think pop3-js did anything different from pop3-cpp. The title says pop, but most of comment 0 applies to all our protocols. I think these two points are still valid
Look at what can be done with a malicious pop/imap/news server. Will reporting
too many messages cause a crash? Any buffer overruns? We should hack a pop
server to deliver unexpected content/large values.
We should have a "sensitive buffer" class for storing passwords and other
sensitive data in memory, that zeros itself out before freeing, and that won't
be swapped to disk. There's probably an existing implementation of this - we
should find it.
Description
•