Ian Douglas <[EMAIL PROTECTED]> writes:

> http://www.imc.org/ietf-822/old-archive1/msg01346.html
>
> Is probably what is being refered to...

But it's not clear that there's any way for a web page to inject
postscript into Mozilla's print-to-ps output.  If there isn't, it's
just as safe as Xprint, also assuming there's no exploit in Xprint.

That message is really about sending arbitrary Postscript files
through interpreters.  Mozilla doesn't produce arbitrary postscript
with unsafe operators, unless there's an unpublished exploit to make
it do so.

-- 
Alan Shutko <[EMAIL PROTECTED]> - I am the rocks.
"Hello, Sacramento Kings Fans Suicide Hotline."


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to