Security Issues in Mozilla 454
paulius_g writes "SecurityFocus has released a security warning with three problems that affect Mozilla on all platforms. The first issue allows the source of a download to be spoofed, generating a fake URL. This security issue is really easy to replicate: Create a long URL and the downloading box will only display its ending (Mozilla and Firefox). The second issue was created by the way that Mozilla's browsers handle news:// links to newsgroups, hackers can easily create false links and create a buffer overflow (Mozilla 1.7.5 and below, Firefox versions before 1.0). The third exploit affects machines with multiple users. The way that Firefox and Thunderbird store files allows every user to see them and to probably catch the other user's surfing habits (Firefox and Thunderbird). Let's hope that these will be fixed soon!"
A fix? (Score:5, Informative)
==========
All Mozilla users should upgrade to the latest version:
Says the site, implying at least a partial fix is available.
Misleading Article (Score:3, Informative)
It would have been helpful for this information to be included in the story. Thanks, Slashdot.
Re:Unacceptable (Score:2, Informative)
Dude, the article says that only versions before Firefox 1.0 are vulnerable, and 1.0 has been out for 2 months already. What are you talking about?
Older versions only (Score:2, Informative)
Basically this is a non issue as everyone should have upgraded to v1.0 as soon as it came out.
Re:A fix? (Score:1, Informative)
Just upgrade to 1.0 and no more problems. You really should have upgraded a while ago...
Third item... (Score:5, Informative)
RTFA - Answers await (Score:2, Informative)
This article is BOGUS! (Score:5, Informative)
They affect Firefox versions BEFORE 1.0, Thunderbird BEFORE
This article was posted by some MS shill who is hoping the because Slashdot is spidered by Google news they will get some mainstream journalism about Firefoxes bugs!
This is TOTAL crap! Let the MS Smear campaign begin!
It *is* already fixed! (Score:2, Informative)
Move on people,nothing to see here!
Re:Umm.... (Score:3, Informative)
I believe that the Docs & Settings folder is owned by the user in question and has the permissions set to keep other users out. But, thanks to the way the Windows runs, everyone pretty much need to be an Administrator to do things like, idk, run a CD-Burning app, so a knowledgable user could change the permissions and look inside.
But, this is a generic Windows problem, most users are Administrators, and they can therefore see other users files. This might not be true in corporate enviornments, but at home its usually the case.
Remember what your mother said, and do not take the name of root in vain.
Re:I bet they will be fixed within 24hours! (Score:5, Informative)
If I read TFA correctly, they're fixed already: Mozilla is listed as unaffected in >=1.7.5, Firefox unaffected in >=1.0, and Thunderbird unaffected in >=0.9.
Interestingly, the original bug report came from the Gentoo security people - is there anyone running Gentoo with anything other that the very latest apps?!
Does no one read anymore? (Score:3, Informative)
=================
Package / Vulnerable / Unaffected
1 mozilla / < 1.7.5 / >= 1.7.5
2 mozilla-bin / < 1.7.5 / >= 1.7.5
3 mozilla-firefox / < 1.0 / >= 1.0
4 mozilla-firefox-bin / < 1.0 / >= 1.0
5 mozilla-thunderbird / < 0.9 / >= 0.9
6 mozilla-thunderbird-bin / < 0.9 / >= 0.9
So, lets try reading this data. If you are running version 1.0 of Firefox, version 1.0 of Thunderbird or version 1.7.5 of Mozilla (all the latest versions) you have NONE of these issues. Geez....
Re:This article is BOGUS! (Score:2, Informative)
How did this pass muster? The article clearly states:
Various vulnerabilities were found and fixed [emphasis added] in Mozilla-based products, ranging from a potential buffer overflow and temporary files disclosure to anti-spoofing issues.
While I recognize the article does state in the middle of it that it was for releases prior to the current ones, why not say that in the title or somewhere in the first sentence. Saying something like, "People using older versions of.....may be vulnerable to security flaws." At first glance, this article is a little misleading.
Re:Does no one read anymore? (Score:5, Informative)
"The vulnerability has been confirmed in Mozilla 1.7.3 for Linux, Mozilla 1.7.5 for Windows, and Mozilla Firefox 1.0. Other versions may also be affected."
So it's actually just one spoofing vulnerability. It's probably a result of fixing the bug in 0.9.something where an overly long (>4kb, IIRC) URL in the address bar could cause firefox to lock up the x-server.
Re:Updates (Score:3, Informative)
On linux, you have stuff like apt / yum / portage to keep computers up to date.
Mac version probably updates itself too, but don't quote me on that.
Re:Third item... (Score:3, Informative)
Re:A fix? (Score:3, Informative)
The second issue was created by the way that Mozilla's browsers handle news:// links to newsgroups, hackers can easily create false links and create a buffer overflow (Mozilla 1.7.5 and below, Firefox versions before 1.0).
The first issue was for all versions (for Firefox and Mozilla), as was the third (for Firefox and Thunderbird).
Wrong! (Score:5, Informative)
Only the buffer overflow issue has been fixed! This article on the Register should clear things up:
http://www.theregister.co.uk/2005/01/07/mozilla_fl aws/ [theregister.co.uk]
Re:Misleading Article (Score:2, Informative)
Anyhoo, regarding color schemes, I ran across this the other day...
http://forums.mozillazine.org/viewtopic.php?t=185
Haven't tried it, but it looks pretty basic.
As for the crew, I'm currently working on an extension to replace michael's rants with underscores.
Well, not really.
Not as critical as they appear in the submission (Score:4, Informative)
Issue 2: Fixed (Affected Versions: Mozilla Browser
This bug is fixed in Mozilla 1.7.5. (Bug 264388)
Mozilla developer Dan Veditz claims that it cannot be exploitable:
"A '\' on the end will certainly trash memory, but at that point you're no
longer reading attacker-supplied data;".
So, at most it would be a DOS attack, not a true "hack into your computer". And from the Security focus link:
So Firefox 1.0 is indeed safe.
Issue #3:From the link:
In other words, 1 outdated, another unconfirmed, and the first one real, but it's moderately critical.
So the Mozilla guys have only to fix ONE bug, and CONFIRM another. Issue #2 is fixed already.
Re:It *is* already fixed! (Score:2, Informative)
Re:A fix? (Score:2, Informative)
Frankly I think the third warning is mostly hype. On many multi-user machines and even multi-system LANs, simply using a tool like tcpdump is going to expose a lot of web traffic to anyone who wants to listen. But because there are ways to be paranoid in such situations, the browser shouldn't casually discard your efforts at security.
Misleading article summary -- the real story (Score:3, Informative)
I'm not too worried about the third one. For one thing, it is easily worked around by setting your $TMP or $TEMP environment variable. Really the global visibility of the files isn't a "bug" in Firefox/Thunderbird or any other app that does this. They're just following the standard system practice of using whatever directory is specified by TMP/TEMP to open their temporarily files in. The issue is that common practice on that score is moderately insecure and may expose info to other users, but there's nothing application authors should do about that.
The permissions issue is the only real "security" problem, but I would bet they did it that way to allow viewers that may be running setuid nobody to still view the file for the user. Perhaps the answer is simply to have documentation about viewers running setuid nobody (or other restricted users) and a configurable list of such viewers that the user can add to. After that, files destined for ordinary viewers should be permissioned 500, and files destined for setuid restricted-user viewers could be permissioned 544 or something else appropriate.
Re:Umm.... (Score:3, Informative)
Now everything is stored under Documents and Settings/user/Application Data/thunderbird
or something like that.
Re:Umm.... (Score:2, Informative)
Re:Sounds like good news to me (Score:3, Informative)
> in your C++ app, then you are potentially
> vulnerable to absolutely anything.
Not really true.
1) If it's a *read* overrun, it's probably not exploitable. Could possibly be an information leak.
2) If it's a write overrun by at most 1 byte, it probably won't be exploitable.
3) A variety other restrictions may apply that make it not exploitable.
4) The browser might have a buffer overrun bug that cannot be triggered by a remote Web page unless the user does some other actions than just viewing the page (e.g., save an image). Although this is still technically exploitable, it's much a less dangerous bug than something that leads to a "view this page and you're 0wned" attack.
Bugzilla numbers (Score:2, Informative)
I know you cant link to Bugzilla directly from Slashdot, but for those of you who are interested the relevant Bugzilla bug numbers to look at for these are:
Re:A fix? (Score:4, Informative)
Regards,
Steve