|
This topic comprises 2 pages: 1 2
|
Author
|
Topic: Firefox 4 Opinions and Comments
|
|
|
|
|
|
|
|
|
|
|
|
James Wallor
Film Handler
Posts: 26
From: Houghton, MI, United States
Registered: Mar 2011
|
posted 05-09-2011 05:54 PM
Fx 4 is a worthwhile update. Miles ahead of Fx 3.6 (hell, Fx 3.x was awful). It still lags behind Chrome and Opera, however.
Bobby, Chrome should run faster on any machine. It's based upon Webkit for a rendering engine (for those that don't know, Webkit is what Safari is based off of and the Chrome programmers made it display pages exactly the same as Safari, even with the bugs, but refused to introduce security hazards with doing this), and it's amazing V8 javascript engine that only barely beats out Carakan (what Opera uses).
Also, Internet Explorer 9 isn't a modern browser, per se, but it's very close. Internet Explorer 9 is about on par with Firefox 3.6. So it's not bad at all, but it could still use better standards implementation and speed improvements (although it is quite faster than Fx 3.6).
| IP: Logged
|
|
Frank Cox
Film God
Posts: 2234
From: Melville Saskatchewan Canada
Registered: Apr 2011
|
posted 05-09-2011 06:08 PM
Researchers Say New Bugs Can Bypass Google Chrome Sandbox
May 9, 2011, 3:40PM Researchers Say New Bugs Can Bypass Google Chrome Sandbox by Dennis Fisher
Researchers at the French security firm VUPEN say that they have discovered several new vulnerabilities in Google Chrome that enable them to bypass the browser's sandbox, as well as ASLR and DEP and run arbitrary code on a vulnerable machine.
The company said that they are not going to disclose the details of the bugs right now, but that they have shared information on them with some of their government customers through its customer program. The vulnerabilities are present in the latest version of Chrome running on Windows 7, VUPEN said.
VUPEN published a video that demonstrates an attack that exploits the Chrome vulnerabilities, although there is no further clues about the bugs themselves.
"The exploit shown in this video is one of the most sophisticated codes we have seen and created so far as it bypasses all security features including ASLR/DEP/Sandbox, it is silent (no crash after executing the payload), it relies on undisclosed (0day) vulnerabilities discovered by VUPEN and it works on all Windows systems (32-bit and x64)," VUPEN said in its advisory about the bugs. "The video shows the exploit in action with Google Chrome v11.0.696.65 on Microsoft Windows 7 SP1 (x64). The user is tricked into visiting a specially crafted web page hosting the exploit which will execute various payloads to ultimately download the Calculator from a remote location and launch it outside the sandbox at Medium integrity level."
Newer versions of Chrome include a sandbox component that is designed to prevent exploits against the browser from being used to run malicious code in other applications on the machine. Google has been offering bounties for more than a year now to researchers who find and report new bugs in Chrome, and other applications, to the company. The highest reward, which is $3133.7, is reserved for the most serious bugs, including those that are able to bypass the sandbox in Chrome.
But VUPEN is reserving details of the vulnerability and sharing just with its customers. Government agencies and defense contractors have been consistent buyers of vulnerabilities for some time and some researchers say that the prices these organizations pay for bugs can be as much as 20 or 30 times higher than what most vendors offers.
| IP: Logged
|
|
|
|
|
All times are Central (GMT -6:00)
|
This topic comprises 2 pages: 1 2
|
Powered by Infopop Corporation
UBB.classicTM
6.3.1.2
The Film-Tech Forums are designed for various members related to the cinema industry to express their opinions, viewpoints and testimonials on various products, services and events based upon speculation, personal knowledge and factual information through use, therefore all views represented here allow no liability upon the publishers of this web site and the owners of said views assume no liability for any ill will resulting from these postings. The posts made here are for educational as well as entertainment purposes and as such anyone viewing this portion of the website must accept these views as statements of the author of that opinion
and agrees to release the authors from any and all liability.
|