Closed Bug 289194 Opened 19 years ago Closed 19 years ago

exploited by malicious people to gain knowledge of potentially sensitive information

Categories

(Firefox :: Security, defect)

x86
Linux
defect
Not set
normal

Tracking

()

VERIFIED DUPLICATE of bug 288688

People

(Reporter: justin.shreve, Assigned: dveditz)

References

()

Details

User-Agent:       Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.6) Gecko/20050403 Firefox/1.0.2
Build Identifier: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.6) Gecko/20050403 Firefox/1.0.2

Not sure if this memory dump bug has been posted, but nothing looked similar, it
was recently posted on secunia and should be fixed by 1.0.3...

http://secunia.com/mozilla_products_arbitrary_memory_exposure_test/

Reproducible: Always

Steps to Reproduce:
1. Load site using Javascript
2. Memory Dump Showed.

Actual Results:  
Data shown.

Expected Results:  
Secure handle of this data.

*** This bug has been marked as a duplicate of 288688 ***
Status: UNCONFIRMED → RESOLVED
Closed: 19 years ago
Resolution: --- → DUPLICATE
Status: RESOLVED → VERIFIED
You need to log in before you can comment on or make changes to this bug.