No it's not - I can't recall the last time Windows can be crashed by merely typing a string. Considering this error is thrown by an assertion within the DataDetector, some programmer thought that this scenario could possibly occur.
No it's not - I can't recall the last time Windows can be crashed by merely typing a string. Considering this error is thrown by an assertion within the DataDetector, some programmer thought that this scenario could possibly occur.
Mountain Lion has been shipping for many months without anyone complaining.
It is entirely possible that the same kind of problem exists on Windows, except nobody found it.
Once it's crashed, it's crashed, and it is impossible to do any harm. In this particular situation, the bug that is there will _always_ crash the application, so it cannot be exploited. In other cases, if a hacker finds a way to crash an app, he or she can then try to find a way to make the app do things the hacker wants it to do instead of crashing. There may be a way to do this, or there may not.
I don't think that's related to this.
No it's not - I can't recall the last time Windows can be crashed by merely typing a string.
Considering this error is thrown by an assertion within the DataDetector, some programmer thought that this scenario could possibly occur.
In plenty of instances the point of the exploit is to crash whatever service you're targeting with the object being that you (or your script/software) gets dropped in a terminal without requiring any authentication. Once this occurs you are free to run commands from the terminal with the same privilege level that the service was previously running with.
No it's not - I can't recall the last time Windows can be crashed by merely typing a string. Considering this error is thrown by an assertion within the DataDetector, some programmer thought that this scenario could possibly occur.
Regardless, this is a denial of service vulnerability that needs to be fixed.Hum... that's now how it works. Crashing an app crashes the app, it doesn't give you a terminal that's running under the user's priviledges.
Regardless, this is a denial of service vulnerability that needs to be fixed.
That's sort of how a DDOS works. You need to have the website open to work.
In plenty of instances the point of the exploit is to crash whatever service you're targeting with the object being that you (or your script/software) gets dropped in a terminal without requiring any authentication. Once this occurs you are free to run commands from the terminal with the same privilege level that the service was previously running with.
No it's not - I can't recall the last time Windows can be crashed by merely typing a string. Considering this error is thrown by an assertion within the DataDetector, some programmer thought that this scenario could possibly occur.
My smartass brother sent this to me via iMessage, I heard my phone so tried opening Messenger on the Macbook. Crash. Left it at that as I was busy anyway. Later he rang and asked if I'd opened the message. Oh great! I could sense him grinning, and I knew what had happened. The iPhone can show it, so no data detector or whatever is causing it there. I turned on the iMac and checked Messages, and it crashed as soon as I opened it. Thanks a lot brother-of-mine!
Regardless, this is a denial of service vulnerability that needs to be fixed.
How so ? Once the app crashes it can't be re-opened by any remote computer.
That's sort of how a DDOS works. You need to have the website open to work.
Once it's closed the DDOS is no longer useful.
I actually stated that earlier. Yes, this is a bug that can be successfully exploited to cause a DoS.
I actually stated that earlier. Yes, this is a bug that can be successfully exploited to cause a DoS.
----------
DDOS = Distributed Denial of Service
DOS = Denial of Service.
The more you know.
This is a DoS bug. The user can be denied the service received by is application. Websites ? That has nothing to do with DoS.
This bug is not a DOS.
to make a machine or network resource unavailable to its intended users.
It's not so many years ago when you could visit a website hosted on a Windows server, and type an address ending ::$DATA. Instead of the web page, you'd often get the source script that generates the page instead, sometimes complete with database user names and passwords if the programmer had been exceptionally careless. A hacker's friend indeed.
You never heard of it on Windows. You never heard of it on a Mac before last week. And if you look at the crash dump, a programmer thought that his code _might_ be given a url that isn't a file url (always good to be careful), and got the test badly wrong. Bugs happen.
In anycase, I'm surprised Apple hasn't been more proactive in launching a hot fix to patch the issue.
Likely that it's because 10.8.3 is late in development, so it'll probably be rolled into that.
Yes, even your wikipedia entry is clear :
If I send you a iMessage with File:/// as the contents, your iMessage application will crash. It's thus unavaible to you.
This is a bug that can result in a DoS exploit if you want to be a nitpicker. Any crash bug is, since the exploit is simply triggering the crash condition, repeatedly if necessary.
It's probably a condition no programmer ever thought could happen.
IE, a protocol (file) that exists, but using a different case. Has anyone tried to replicate this with fIle:/// fiLe:/// or filE:/// ? This is probably related to some part of the framework doing case insentitive searches passing unmodified strings to a part of the framework doing case sensitive operations. Results in the "Found the protocol! try to do stuff... Can't do that on an unexisting protocol!".
The programmer probably thought : "protocol either is registered or not, anything else is an exception" with a nice "/* We should never get here */"
That was a very good insight! Those crashed my safari (somehow the quote function has not). I would guess you have guessed the bug (or did I miss the story that explains the problem).
Whatever you do, do NOT do this as a Logon Message ;p. i just tryed this to 'see', and it constantly cycled the logon screen.. Yep. It worked, but now i'm locked out.