Board index » Help Help » Technical Support




Post new topic Reply to topic  [ 6 posts ] 
Author Message
 Post subject: Critical Flaw found in Firefox
PostPosted: Mon May 09, 2005 7:24 pm 
Offline
User avatar
Reissued
 WWW  Profile

Joined: Sat Oct 16, 2004 11:09 pm
Posts: 24847
Location: this stark raving, sick, sad little world
Gender: Male
Firefox has unpatched "extremely critical" security holes and exploit code is already circulating on the Net, security researchers have warned.

The two unpatched flaws in the Mozilla browser could allow an attacker to take control of your system.

A patch is expected shortly, but in the meantime users can protect themselves by switching off JavaScript. In addition, the Mozilla Foundation has now made the flaws effectively impossible to exploit by changes to the server-side download mechanism on the update.mozilla.org and addons.mozilla.org sites, according to security experts.

The flaws were confidentially reported to the Foundation on May 2, but by Saturday details had been leaked and were reported by several security organizations, including the French Security Incident Response Team (FrSIRT). Danish security firm Secunia marked the exploit as "extremely critical", its most serious rating, the first time it has given a Firefox flaw this rating.

In recent months Firefox has gained significant market share from Microsoft's Internet Explorer, partly because it is considered less vulnerable to attacks. However, industry observers have long warned that the browser is more secure partly because of its relatively small user base. As Firefox's profile grows, attackers will increasingly target the browser.


Two Vulnerabilities Found

The exploit, discovered by Paul of Greyhats Security Group and Michael "mikx" Krax, makes use of two separate vulnerabilities. An attacker could create a malicious page using frames and a JavaScript history flaw to make software installations appear to be coming from a "trusted" site. By default, Firefox allows software installations from update.mozilla.org and addons.mozilla.org, but users can add their own sites to this whitelist.

The second part of the exploit triggers software installation using an input verification bug in the "IconURL" parameter in the install mechanism. The effect is that a user could click on an icon and trigger the execution of malicious JavaScript code. Because the code is executed from the browser's user interface, it has the same privileges as the user running Firefox, according to researchers.

Mozilla Foundation said it has protected most users from the exploit by altering the software installation mechanism on its two whitelisted sites. However, users may be vulnerable if they have added other sites to the whitelist, it warned.

"We believe this means that users who have not added any additional sites to their software installation whitelist are no longer at risk," Mozilla Foundation said in a statement published on Mozillazine.org.

_________________
never mind, death professor.


Top
 
 Post subject:
PostPosted: Mon May 09, 2005 8:44 pm 
Offline
User avatar
The Man, The Myth
 WWW  Profile

Joined: Sun Oct 17, 2004 12:12 am
Posts: 1080
Location: boulder
Jim wrote:
the Mozilla Foundation has now made the flaws effectively impossible to exploit by changes to the server-side download mechanism on the update.mozilla.org and addons.mozilla.org sites


Jim wrote:
Mozilla Foundation said it has protected most users from the exploit by altering the software installation mechanism on its two whitelisted sites. However, users may be vulnerable if they have added other sites to the whitelist, it warned.


This will effect maybe 0.0001% of people that use Firefox, why even post it?

_________________
"my fading voice sings, of love..."


Top
 
 Post subject:
PostPosted: Mon May 09, 2005 9:18 pm 
Offline
User avatar
not a big Gay guy
 Profile

Joined: Mon Oct 18, 2004 8:52 pm
Posts: 8552
indeed. why even post anything, ever, unless it has widespread implications that a large majority of the population can relate to.

_________________
i was dreaming through the howzlife yawning car black when she told me "mad and meaningless as ever" and a song came on my radio like a cemetery rhyme for a million crying corpses in their tragedy of respectable existence


Top
 
 Post subject:
PostPosted: Thu May 12, 2005 8:05 am 
Offline
User avatar
Force of Nature
 WWW  Profile

Joined: Mon Oct 18, 2004 7:40 am
Posts: 965
Location: Poland/Canada
Gender: Male
A security update fixing the bug is available for download:
http://www.mozilla.org/products/firefox/

_________________
"Heh heh.. I'm just going to let you ramble.." - AJF
"How I choose to feel is how I am" - MM


Top
 
 Post subject:
PostPosted: Thu May 12, 2005 1:09 pm 
Offline
User avatar
Got Some
 Profile

Joined: Sun Oct 17, 2004 3:31 pm
Posts: 2423
Location: White Hart Lane
Gender: Male
stonecrest wrote:
Jim wrote:
the Mozilla Foundation has now made the flaws effectively impossible to exploit by changes to the server-side download mechanism on the update.mozilla.org and addons.mozilla.org sites


Jim wrote:
Mozilla Foundation said it has protected most users from the exploit by altering the software installation mechanism on its two whitelisted sites. However, users may be vulnerable if they have added other sites to the whitelist, it warned.


This will effect maybe 0.0001% of people that use Firefox, why even post it?


Actually, firefox has an estmated 10% of the market. So this (in theory) should affect 1 in 10 of the RM community.

So there!!

_________________
Juvenal wrote:
Spags is a drunken cockney hero


Top
 
 Post subject:
PostPosted: Thu May 12, 2005 1:18 pm 
Offline
User avatar
Force of Nature
 WWW  Profile

Joined: Mon Oct 18, 2004 7:40 am
Posts: 965
Location: Poland/Canada
Gender: Male
spaggy boy wrote:
stonecrest wrote:
Jim wrote:
the Mozilla Foundation has now made the flaws effectively impossible to exploit by changes to the server-side download mechanism on the update.mozilla.org and addons.mozilla.org sites


Jim wrote:
Mozilla Foundation said it has protected most users from the exploit by altering the software installation mechanism on its two whitelisted sites. However, users may be vulnerable if they have added other sites to the whitelist, it warned.


This will effect maybe 0.0001% of people that use Firefox, why even post it?


Actually, firefox has an estmated 10% of the market. So this (in theory) should affect 1 in 10 of the RM community.

So there!!


What Scott meant is that the flaw will affect only a small percentage of the users of Firefox, not of all Internet browser users.

The flaw might have been minor in terms of the number of users it could have affected, but from what I understand it still was major in terms of potential damage it could have caused.

It just shows you that no matter how improbable it is that a given security hole will be exploited, the Firefox people treat it very seriously and fix it as fast they can.

_________________
"Heh heh.. I'm just going to let you ramble.." - AJF
"How I choose to feel is how I am" - MM


Top
 
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 6 posts ] 

Board index » Help Help » Technical Support


Who is online

Users browsing this forum: No registered users and 3 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
It is currently Wed Feb 04, 2026 10:05 pm