Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Mozilla The Internet Security

New Firefox Vulnerability Revealed 250

Not long after Firefox 3.5.1 was released to address a security issue, a new exploit has been found and a proof of concept has been posted. "The vulnerability is a remote stack-based buffer-overflow, triggered by sending an overly long string of Unicode data to the document.write method. If exploited, the resulting overflow could lead to code execution, or if the exploit attempts fail, a denial-of-service scenario." It's recommended that Firefox users disable Javascript until the issue is patched, though add-ons like NoScript should do the trick as well (unless a site on your whitelist becomes compromised).

Update: 07/20 00:09 GMT by KD : An anonymous reader informs us that the Mozilla security blog is indicating that this vulnerability is not exploitable; denial of service is as bad as it gets.
This discussion has been archived. No new comments can be posted.

New Firefox Vulnerability Revealed

Comments Filter:
  • by Anonymous Coward on Sunday July 19, 2009 @01:30PM (#28748615)

    It looks like the proof of concept only shows how this could lead to a stack overflow. There is no concept about how this could lead to code execution, which makes this just just another way to crash a browser.
    Crashing browsers is of course potentially a problem, but it quite boring while there are still so many ways to do real exploits.

  • by Anonymous Coward on Sunday July 19, 2009 @01:38PM (#28748667)

    Really? Taking a look at stories that have the defectivebydesign tag [slashdot.org] there are DRM stories as you point out. However, look at some of the stories in there:

    * Critical security hole in Linux Wi-Fi
    * Apple issues patches for 25 security holes
    * Very severe hole in Vista UAC design
    * Surprise, Windows listed as most secure OS
    * Vista worse for user efficiency than XP
    * Loophole in Windows random number generator
    * Remote exploit of Vista speech control
    * SP1 unsuccessful in preventing Vista hacks
    * Data loss bug in OS X 10.5 Leopard

    And so on. So yes, the majority of stories using the tag are DRM-related but there's an increasing usage towards general-purpose software bugs or exploits as shown by the articles I pointed out.

  • Not just Firefox? (Score:5, Informative)

    by Norsefire ( 1494323 ) * on Sunday July 19, 2009 @01:42PM (#28748677) Journal
    The proof of concept has crashed every browser I've tried it on; Firefox (obviously) (and the 3.6 nightly), Epiphany, Chromium, Opera and Android Browser. So is Firefox the only browser that is exploitable during the crash or other browsers affected?
  • by TheMCP ( 121589 ) on Sunday July 19, 2009 @01:51PM (#28748739) Homepage

    To say, for the contemporary web, "turn off javascript", is to say, "break everything". If I can't safely use the browser with Javascript, I can't safely use the browser.

  • Re:Unbounded (Score:5, Informative)

    by maxume ( 22995 ) on Sunday July 19, 2009 @01:55PM (#28748769)

    This is another, different bug than the one talked about in the first link. None of the other links specify whether this second bug is from the JIT or not.

  • by BZ ( 40346 ) on Sunday July 19, 2009 @02:01PM (#28748803)

    Have you tried the POC? Ideally under a debugger? It's a null-dereference crash due to failure to check an allocation for out-of-memory conditions. It's not exploitable, as far as I can see. And it's not a stack buffer overflow, by any means.

    It'd be nice if these various security advisory services actually double-checked milw0rm postings before echoing them. Half the ones I've seen are in fact crashes, but not the sort the poster claims and not exploitable....

  • by BZ ( 40346 ) on Sunday July 19, 2009 @02:05PM (#28748833)

    It's not a buffer overflow. It's a missing OOM check leading to a non-exploitable (well, if your kernel is sane; some Linux versions are not) null-dereference crash.

    Note also that the article linked to is misreporting this in other ways as well; unfortunately I'm not at liberty to go into details on that yet. :(

  • by BZ ( 40346 ) on Sunday July 19, 2009 @02:07PM (#28748843)

    > It looks like the proof of concept only shows how this could lead to a stack overflow

    It actually doesn't even show that, if you try running it under a debugger... It shows a null dereference due to lack of out-of-memory check on an allocation.

  • Re:Not just Firefox? (Score:4, Informative)

    by BZ ( 40346 ) on Sunday July 19, 2009 @02:13PM (#28748875)

    When I tried this, I see Firefox crashing with a null dereference. So not exploitable.

    Do you see something different?

  • by Inda ( 580031 ) <slash.20.inda@spamgourmet.com> on Sunday July 19, 2009 @02:17PM (#28748909) Journal

    Worse POC evar

    -----

    <html>
    <head>
    <script language="JavaScript" type="Text/Javascript">
    var str = unescape("%u4141%u4141");
    var str2 = unescape("%u0000%u0000");
    var finalstr2 = mul8(str2, 49000000);
    var finalstr = mul8(str, 21000000);


    document.write(finalstr2);
    document.write(finalstr);

    function mul8 (str, num) {
    var i = Math.ceil(Math.log(num) / Math.LN2),
    res = str;
    do {
    res += res;
    } while (0 < --i);
    return res.slice(0, str.length * num);
    }
    </script>
    </head>
    <body>
    </body>
    </html>
    <html><body></body></html>

  • by Xest ( 935314 ) on Sunday July 19, 2009 @02:31PM (#28748981)

    Looking at W3Schools stats on it it's about 5%. I've seen some stats suggest as high as 16% around 3 years ago:

    http://www.w3schools.com/browsers/browsers_stats.asp [w3schools.com]

    I feel Javascript is an important technology and rather than fucking around with all the proprietary crap like Flash we should be strengthening Javascript so it's more secure and more useful, in fact, a lot of browser vendors seem to be doing this, and those Chrome demos posted a few months back were agood example.

    But I also think it's silly to assume and design for Javascript unless Javascript is the whole point of your site. There's so many sites out there that use Javascript for things like drop down menus and sometimes even positioning where CSS would suffice and not require Javascript support it's silly. To turn away 1 in 20 users doesn't seem the brightest idea unless you're building a web application where absolutely the only way to do what you want to do is to use Javascript.

    Javascript shouldn't be a requirement for the vast majority of the web, only for those sites that truly need it.

  • by dtschmitz ( 1601217 ) on Sunday July 19, 2009 @02:55PM (#28749131)
    Folks, Noscript will catch most Javascript exploits, but you should have a 'catch net'. AppArmor provides a 'sandbox' around any process you want. Firefox is a good example that I have written a how-to for creating an AppArmor Profile in Ubuntu 9.0.4 Read my blog here [dtschmitz.com] Be Safe. Dietrich T. Schmitz
  • Re:Not just Firefox? (Score:3, Informative)

    by BZ ( 40346 ) on Sunday July 19, 2009 @03:01PM (#28749173)

    Well, the fact that SANS is blindly reposting known-unreliable things like milw0rm postins is something of an event, to me... Forgetting the fact that it tarnishes the reputations of whatever software they falsely accuse of being vulnerable, it leads to SANS being less reliable and less trusted. The whole crying wolf thing.

    But yeah, I agree that this "exploit" is nothing of the kind.

  • by BZ ( 40346 ) on Sunday July 19, 2009 @03:16PM (#28749279)

    Ok, here's the full deal:

    1) The crash is not exploitable, for anyone who's been able to reproduce it so far.
    2) The crash is in system text-rendering libraries (which apparently don't check for
          out-of-memory much), not in Firefox code, for everyone who's been able to
          reproduce it so far.

  • by Anders ( 395 ) on Sunday July 19, 2009 @05:30PM (#28750363)

    I have to wonder why it's taken so long for anybody's security team to look at this code though. You'd think they'd look at this code before release and not after.

    Announcing defects in beta software doesn't get you noticed.

  • by Mike Shaver ( 7985 ) on Sunday July 19, 2009 @06:30PM (#28750771) Homepage
    See http://blog.mozilla.com/security/2009/07/19/milw0rm-9158-stack-overflow-crash-not-exploitable-cve-2009-2479/ [mozilla.com] for more details, including specifics about how the bug affects different platforms and versions (worst case: unexploitable crash in OS X system libraries).
  • not exploitable (Score:5, Informative)

    by asa ( 33102 ) <asa@mozilla.com> on Sunday July 19, 2009 @07:47PM (#28751231) Homepage
    See what Mozilla has to say: http://blog.mozilla.com/security/2009/07/19/milw0rm-9158-stack-overflow-crash-not-exploitable-cve-2009-2479/ [mozilla.com] In the last few days, there have been several reports (including one via SANS) of a bug in Firefox related to handling of certain very long Unicode strings. While these strings can result in crashes of some versions of Firefox, the reports by press and various security agencies have incorrectly indicated that this is an exploitable bug. Our analysis indicates that it is not, and we have seen no example of exploitability. On Windows, Firefox 3.0.x is terminated due to an uncaught exception during an attempt to allocate a very large string buffer; this termination is safe and immediate, and does not permit the execution of attacker code. In Firefox 3.5.x on Windows, the allocations are more robustly checked and no crash will result. On the Macintosh in Firefox 3.0.x and 3.5.x, a crash occurs inside the ATSUI system library (part of OS X), due to what appears to be a failure to check allocation results. This issue is likely to affect any application using the recommended text-handling libraries on OS X. We have reported this issue to Apple, but in the event that they do not provide a fix we will look to implement mitigations in Mozilla code. We recommend that other developers who use these libraries consider a similar practice, and we have added mitigations in the past for similar bugs in these libraries. As a result of our analysis, we do not believe that this represents an exploitable vulnerability in Firefox. Further, we believe that the IBM report is in error, and that the severity rating in the National Vulnerability Database report is incorrect. We have contacted them and hope to resolve the inaccuracies shortly.

All the simple programs have been written.

Working...