Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Mozilla The Internet Security

New Vulnerabilities Discovered in Firefox 1.0 406

jflint writes "Today, the security firm Secunia has released 8 more security vulnerabilities it has discovered in Mozilla products, including Firefox and Thunderbird. The exploits "could be used by criminals to spoof, or fake, various aspects of a Web site, ranging from its SSL secure site icon to the contents of an inactive tab.""
This discussion has been archived. No new comments can be posted.

New Vulnerabilities Discovered in Firefox 1.0

Comments Filter:
  • New Discovery? (Score:5, Interesting)

    by fembots ( 753724 ) on Wednesday March 02, 2005 @08:47PM (#11829721) Homepage
    Today, the security firm Secunia has released 8 more security bugs it has discovered in Mozilla products, including Firefox and Thunderbird. [......] If you have downloaded the Firefox 1.0.1 update, you have nothing to worry about

    Firefox 1.0.1 update was out before today, so did Secunia just look at what 1.0.1 update fixes and release its "bug" report, or did they discover something new to 1.0.1?
  • by Mustang Matt ( 133426 ) on Wednesday March 02, 2005 @09:10PM (#11829940)
    Does anyone have an explanation as to why firefox's online update feature doesn't upgrade to 1.0.1?
  • by The Bungi ( 221687 ) <thebungi@gmail.com> on Wednesday March 02, 2005 @09:16PM (#11829995) Homepage
    Kinda like the open source PR war machine (valiantly spearheaded by Slashdot) made the most of every single IE advisory and vulnerability in the past four years?

    Welcome to the real world. You can't have your cake and eat it.

  • by Anonymous Coward on Wednesday March 02, 2005 @09:24PM (#11830039)
    What?
    I never had a problem with slashdot. What exactly makes it "unreadable"?


    Sometimes the stories or comments get shoved into the left nav. Sometimes the tables don't render at all leaving a largely blank page. This has been a problem since Netscape 7.0 came out (whatever version of mozilla that was.) In fact, when Slashdot put up the story about NS7 being release, I immediately downloaded it and just as quickly found the problem. I don't use windows much, but under linux, this has been a problem for quite a while. There are work arounds like ctrl +-, but the fact is that Slashdot does not render the same way every time. I have not seen this behavior to this extreme on any other website. If I were a slashcoder, I'd be extremely embarrassed. Then again, it seems that one quality required to be a Slashdot editor/coder is to be able to publicly make a complete fool out of yourself repeatedly for years and not give a shit.

    NB
  • by Anonymous Coward on Wednesday March 02, 2005 @09:25PM (#11830041)
    I wonder if these major flaws that are discovered are reported to Mozilla for their Bug Bounty [mozilla.org] program...
  • MSIE? (Score:1, Interesting)

    by rice_burners_suck ( 243660 ) on Wednesday March 02, 2005 @09:36PM (#11830115)
    Vulnerabilities in Firefox?!???!!!?!?! I'm switching back to Internet Explorer. At least with that program, I was safe from all security issues.

    Just kidding... I use Opera. BTW, try the new Beta of Opera 8. It's quite nice.

  • by Soldrinero ( 789891 ) on Wednesday March 02, 2005 @09:36PM (#11830123)
    I also waited for Firefox to alert me that an update was available, both to be kind to the servers and to see how the update process worked. Yeasterday it alerted me to the update via a new icon next to the activity icon in the upper right of the window.

    Interestingly, when I went through the update process, it downloaded and installed the full 1.01 package. Does anyone know if this is how updates will be done in the future, or if Mozilla will migrate to a patch system?
  • SOP for Secunia... (Score:5, Interesting)

    by Anonymous Coward on Wednesday March 02, 2005 @09:37PM (#11830132)
    They released their list of major vulnurabilities in IE two days before MS released the update and months after they reported the problems originally.

    They're just glory whores.
  • Food for thought... (Score:3, Interesting)

    by Ericzombie ( 812295 ) on Wednesday March 02, 2005 @09:43PM (#11830175)
    Anyone else notice how now that Firefox has gotten pretty big, you're mostly hearing about firefox issues, rather thant he slew of IE issues that we used to be swarming over. In essence it makes sense as most /.ers have upgraded to Firefox, however it just seems to be working that way. I don't think that M$ could have gotten all of the kinks out of IE, so whats the deal?
  • Re:Here we go... (Score:2, Interesting)

    by Statecraftsman ( 718862 ) on Wednesday March 02, 2005 @09:45PM (#11830192)
    I see this as the beginning of what could be called a vulnerability war. We all know there are tons of bugs in any software that's actually released to the wild. With that said, the number of vulnerabilities that are found is really just a function of how hard people look.

    Once found, if people want to be malicious about it, they'll release the vulnerability information to black hats, then the public, then the company(if at all). If bugs cause people to switch browsers, all that needs to be done is make sure you find more bugs in your competitors software.

    I read an article not long ago questioning whether posting vulnerability information in any public forum was really a good idea and the question still remains.

  • Re:New Discovery? (Score:5, Interesting)

    by LnxAddct ( 679316 ) <sgk25@drexel.edu> on Wednesday March 02, 2005 @10:42PM (#11830523)
    It is certainly good that people are looking out for bugs, but Secunia didn't find these. They just compiled a list of known bugs that were fixed in 1.0.1. Their site is supposed to be a consolidated source for finding vulnerabilites and researching the security of applications, which means whether or not they find the vulnerabilites, they report on them.
    Regards,
    Steve
  • by 28481k ( 849458 ) on Wednesday March 02, 2005 @11:38PM (#11830861)
    I uses the en-US version of Firefox as well and I think I would wait until the auto-update kicks in so that there would be less hassle to update the browser. Yesterday Morning I saw the update sign shown on the browser, so I clicked it to see if it could auto-update my browser. But it stopped three-quarters or four-fifths of the way through, and since then I could not download it further (not for another 10 hours...). So later, I decided to take the matter on my hands and uninstall Fx 1.0 for Fx 1.0.1 manually.

    Grrr... After I reinstall Firefox 1.0.1, the update still reminded me that there's update available, I wonder what's that since I couldn't downlaod it....
  • Re:Firefox bugs (Score:2, Interesting)

    by hennie ( 719660 ) on Thursday March 03, 2005 @12:41AM (#11831221)
    Maybe off topic for TFA, but not so much for the post.

    I agree with you that the more popular a product is, the more it gets attacked. For example, virii needs a certain population density of infectable hosts to proliferate. Linux machines, for example, is not there. I dont think it is truly worth anyones time to write linux, or for that matter anything other that win32, virii.

    However, having agreed with you, I also want to argue the security case for linux. Let us for example take writing a virus for linux:

    To do some real damage in linux, a virus needs root access. People dont normaly run as root so yes, linux and for that matter *nix is designed more secure than win32.

    Maybe I should clarify. In order for the virus to execute, it needs to load itself into memmory and/or infect an executable.

    A memory only virus can be easily detected by a process list or something similar and killed by logging off or rebooting.

    Infecting an executable is problematic since it needs write access to said executable, a privilege users dont generally have. There are two ways around this.

    The first would be to create and executable with the appropriate privileges in the users home directory or /tmp/. This would be the easiest way, but the desructive potential would be limited to the specific user. Also, the virus needs to add a line to one of the users start up scripts to execute on login. Again, this would be trivial to detect and disinfect. If it becomes a problem, a system where MD5s are kept and checked periodically for startup scripts would be a good start.

    The second is to gain root privileges by exploiting kernel vulns or software vulns running as root. This is definitely not easy as it seems. Any cracker should be able to testify to that. Also, with so many flavours of linux, some exploits present in some software and some in others, the probability of your virus working is relatively low. This option is definitely not your VB script-kiddie job as some of the high profile w32 virii was - you need to be good to do this, but you could trash the whole system if you can get this right.

    OK, there is a third way. It involves tricking the user into actually giving root to the virus. I see that as the greatest threat if more computer semi-literates start using linux. This, IMO, is not an inherent problem of the OS, but the ignorance of the user and can only be fixed by education.

    Also, the path of infection in *nix is more difficult. With explorer integrated in the OS, addware and virii are much easier to get in through malicious websites or emails.

    To be honest though, the last Microsoft OS I used extensively was W2K which I only used to compile and test win32 versions of my code - usually after a lot of blood, sweat, tears, #defines and swearing;). I dont know much about their security model now. Could be quite good, but I doubt it since we still hear alot about virii and addware infecting the systems.

    So, this is my (I think justified) opinion:
    The Linux security model, while not perfect is definitely better than the win32 model.

    To get a bit on topic:
    Yes, I use firefox exclusively to browse. Once again I dont think it is perfect. I love the features - cant live without tabbed browsing + extentions, but sometimes I get anoyed at some of the quirks - slashdot bug has me pressing ctrl+;ctrl- on every page load for example. BTW yes, it IS firefox's fault.

    Is firefox better/more secure/tighter coded than IE? Nobody that truly knows will ever tell - We probably wont trust them in any case ;) -. I actually have my doubts. According to some posts I read on slashdot, valgrind spits out quite a few memory leaks. Cant be bothered to find those posts, but try for yourself:
    $firefox --debuger valgrind

    Also, late last year there was another slashdot story
    http://it.slashdot.org/article.pl?sid=04/10 /19/023 6213
    where firefox didnt do too good on broken html. IIRC there was a few buffer overruns inolved which COULD POSSIBLY indicate security vulns. and certainly some slightly less than tight code.

    Just my opinion.
  • Re:New Discovery? (Score:3, Interesting)

    by LnxAddct ( 679316 ) <sgk25@drexel.edu> on Thursday March 03, 2005 @12:47AM (#11831252)
    Or how about just stopping the javascript interpreter when the window isn't in focus. And if a child window is being viewed make sure thats its parent windows gain focus behind it or something to that affect. That would more or less cover all the cases, would it not?
    Regards,
    Steve
  • the real difference (Score:4, Interesting)

    by IdentifiedDareDevil ( 842240 ) on Thursday March 03, 2005 @02:37AM (#11831737)
    (for me) isn't really the technology or the security. IE and firefox are really not that far apart in terms of bugs/features (yet).. the main difference to me is that one on hand, you have a greedy, monopolistic company working outside proper market forces - allowing it to decide when and how it improves its software (IE 6.0 released in Aug 2002 - what major sw app can get away with a 3 year major release cycle?) vs. Firefox/Mozilla - a grass-roots colaboration of people who are trying to make something significant and have fun at the same time.

    The choice for me is not a lot different than choosing to live in the Soviet Union or the United States. I'd rather not eat the gruel (or browser) someone else thinks is all I deserve.
  • MOD PARENT UP! (Score:0, Interesting)

    by Anonymous Coward on Thursday March 03, 2005 @06:44AM (#11832277)
    +1 Informative.

    There is no reason to use JavaScript for displaying web pages. It's just stupid. Everyone should turn all scripting off (JavaScript, VBScript, ActiveX, Flash, etc.), and avoid web sites that require it.

    Almost anything productive that is done with JavaScript can be done using forms. I know some people will say "But without JavaScript, verification will have to be done on the server instead of the client, and I won't be able to pop up new windows programmatically." Well, boo hoo. First of all, any web site that is the least bit secure will revalidate the form fields anyway (to prevent cracking), so the only thing being saved by client-side validation is a little bit of bandwidth to refresh the page if a field is wrong. (If it takes a lot of bandwidth to refresh a forms page, then there's something wrong with the page.) As to the pop-up complaint, well, I don't want the fucking page to pop up any fucking windows programmatically. Give me a link and let me make up my own mind.

    Web page scripting sucks, and should be stopped.
  • by harryoyster ( 814652 ) on Thursday March 03, 2005 @07:13AM (#11832355) Homepage
    I would love to see how they actually find some of these vulnerabilities. Direct from secunia : "The vulnerability is caused due to missing URI handler validation when dragging an image with a "javascript:" URL to the address bar. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an arbitrary site by tricking a user into dragging an image to the address bar." Dont think ive ever dragged anything from a web page in my life.. I maybe a newbie though (only been on the net since 1992..

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...