OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

 


 

   RE: [xml-dev] Wrapping Scripted Media in RSS: Secure?

[ Lists Home | Date Index | Thread Index ]

So overall, the original thread conclusion and Bill Kearney 
are right:  RSS should resist scripted content regardless 
of market pressures?

len


From: Ken North [mailto:kennorth@sbcglobal.net]

Robert Koberg wrote:
> But isn't this more about server admins than possible problems with
> script in content?
>
> How can their be problems if the script cannot be executed?

Given that we've seen security threats related to non-executable content,
you
comment about server administration hits the nail on the head.

1. Vulnerabilities related to XML, DTD, XML-RPC and SOAP processing:
http://www.webservicessummit.com/Vulnerabilities.htm

2. SQL injection vulnerabilities are epidemic.

3. MP3, WMA, AVI, PNG and JPEG have been exploited. The problem is often a
buffer overrun that can be exploited by constructing a file to cause the
overrun
and allow malware to execute.

There's a worm that exploited a vulnerability in some Windows apps that read
JPEG images. One of the MP3 exploits uses an ID3 tag.
There have been vulnerabilities in media players (Flash Player, RealPlayer,
Windows Media Player, MPlayer).




 

News | XML in Industry | Calendar | XML Registry
Marketplace | Resources | MyXML.org | Sponsors | Privacy Statement

Copyright 2001 XML.org. This site is hosted by OASIS