independent and unofficial
Prince fan community
Welcome! Sign up or enter username and password to remember me
Forum jump
Forums > General Discussion > Critical Flaw Found in Firefox
« Previous topic  Next topic »
  New topic   Printable     (Log in to 'subscribe' to this topic)
Author

Tweet     Share

Message
Thread started 05/09/05 12:10pm

ella731

avatar

Critical Flaw Found in Firefox

Firefox has unpatched "extremely critical" security holes and exploit code is already circulating on the Net, security researchers have warned.


The two unpatched flaws in the Mozilla browser could allow an attacker to take control of your system.

A patch is expected shortly, but in the meantime users can protect themselves by switching off JavaScript. In addition, the Mozilla Foundation has now made the flaws effectively impossible to exploit by changes to the server-side download mechanism on the update.mozilla.org and addons.mozilla.org sites, according to security experts.

The flaws were confidentially reported to the Foundation on May 2, but by Saturday details had been leaked and were reported by several security organizations, including the French Security Incident Response Team (FrSIRT). Danish security firm Secunia marked the exploit as "extremely critical", its most serious rating, the first time it has given a Firefox flaw this rating.

In recent months Firefox has gained significant market share from Microsoft's Internet Explorer, partly because it is considered less vulnerable to attacks. However, industry observers have long warned that the browser is more secure partly because of its relatively small user base. As Firefox's profile grows, attackers will increasingly target the browser.

Two Vulnerabilities Found
The exploit, discovered by Paul of Greyhats Security Group and Michael "mikx" Krax, makes use of two separate vulnerabilities. An attacker could create a malicious page using frames and a JavaScript history flaw to make software installations appear to be coming from a "trusted" site. By default, Firefox allows software installations from update.mozilla.org and addons.mozilla.org, but users can add their own sites to this whitelist.

The second part of the exploit triggers software installation using an input verification bug in the "IconURL" parameter in the install mechanism. The effect is that a user could click on an icon and trigger the execution of malicious JavaScript code. Because the code is executed from the browser's user interface, it has the same privileges as the user running Firefox, according to researchers.

Mozilla Foundation said it has protected most users from the exploit by altering the software installation mechanism on its two whitelisted sites. However, users may be vulnerable if they have added other sites to the whitelist, it warned.

"We believe this means that users who have not added any additional sites to their software installation whitelist are no longer at risk," Mozilla Foundation said in a statement published on Mozillazine.org.
  - E-mail - orgNote - Report post to moderator
Reply #1 posted 05/09/05 12:22pm

analbolique

  - E-mail - orgNote - Report post to moderator
Reply #2 posted 05/09/05 12:46pm

evenstar3

avatar

eek

-is typing this on mozilla-

goddamnit!
  - E-mail - orgNote - Report post to moderator
Reply #3 posted 05/09/05 12:50pm

Handclapsfinga
snapz

ehh, it was a matter of time. shrug
  - E-mail - orgNote - Report post to moderator
Reply #4 posted 05/09/05 1:08pm

lilgish

avatar

I was just about to install it.....
  - E-mail - orgNote - Report post to moderator
Reply #5 posted 05/09/05 1:09pm

Handclapsfinga
snapz

lilgish said:

I was just about to install it.....

you can still install it--just gotta be more careful with updating it n'such.
  - E-mail - orgNote - Report post to moderator
Reply #6 posted 05/09/05 1:45pm

Hotlegs

ella731 said:

Firefox has unpatched "extremely critical" security holes and exploit code is already circulating on the Net, security researchers have warned.


The two unpatched flaws in the Mozilla browser could allow an attacker to take control of your system.

A patch is expected shortly, but in the meantime users can protect themselves by switching off JavaScript. In addition, the Mozilla Foundation has now made the flaws effectively impossible to exploit by changes to the server-side download mechanism on the update.mozilla.org and addons.mozilla.org sites, according to security experts.

The flaws were confidentially reported to the Foundation on May 2, but by Saturday details had been leaked and were reported by several security organizations, including the French Security Incident Response Team (FrSIRT). Danish security firm Secunia marked the exploit as "extremely critical", its most serious rating, the first time it has given a Firefox flaw this rating.

In recent months Firefox has gained significant market share from Microsoft's Internet Explorer, partly because it is considered less vulnerable to attacks. However, industry observers have long warned that the browser is more secure partly because of its relatively small user base. As Firefox's profile grows, attackers will increasingly target the browser.

Two Vulnerabilities Found
The exploit, discovered by Paul of Greyhats Security Group and Michael "mikx" Krax, makes use of two separate vulnerabilities. An attacker could create a malicious page using frames and a JavaScript history flaw to make software installations appear to be coming from a "trusted" site. By default, Firefox allows software installations from update.mozilla.org and addons.mozilla.org, but users can add their own sites to this whitelist.

The second part of the exploit triggers software installation using an input verification bug in the "IconURL" parameter in the install mechanism. The effect is that a user could click on an icon and trigger the execution of malicious JavaScript code. Because the code is executed from the browser's user interface, it has the same privileges as the user running Firefox, according to researchers.

Mozilla Foundation said it has protected most users from the exploit by altering the software installation mechanism on its two whitelisted sites. However, users may be vulnerable if they have added other sites to the whitelist, it warned.

"We believe this means that users who have not added any additional sites to their software installation whitelist are no longer at risk," Mozilla Foundation said in a statement published on Mozillazine.org.


hmmm I had a feeling something like this would happen. This is why I haul ass install the bugger into my CPU yet.
  - E-mail - orgNote - Report post to moderator
Reply #7 posted 05/09/05 3:18pm

Tish4

avatar

thanks.....I have never installed it, looks like I won't be either...
You can't build something new, without destroying something old



<<---;;;
------;;;;;'
  - E-mail - orgNote - Report post to moderator
Reply #8 posted 05/09/05 3:26pm

analbolique

Tish4 said:

thanks.....I have never installed it, looks like I won't be either...


All browsers have security issues. Personally I've never had problems with any browser concerning that. It all depends on who's behind the computer.
  - E-mail - orgNote - Report post to moderator
  New topic   Printable     (Log in to 'subscribe' to this topic)
« Previous topic  Next topic »
Forums > General Discussion > Critical Flaw Found in Firefox