New Firefox Vulnerability Revealed 250
Not long after Firefox 3.5.1 was released to address a security issue, a new exploit has been found and a proof of concept has been posted. "The vulnerability is a remote stack-based buffer-overflow, triggered by sending an overly long string of Unicode data to the document.write method. If exploited, the resulting overflow could lead to code execution, or if the exploit attempts fail, a denial-of-service scenario." It's recommended that Firefox users disable Javascript until the issue is patched, though add-ons like NoScript should do the trick as well (unless a site on your whitelist becomes compromised).
Update: 07/20 00:09 GMT by KD : An anonymous reader informs us that the Mozilla security blog is indicating that this vulnerability is not exploitable; denial of service is as bad as it gets.
Update: 07/20 00:09 GMT by KD : An anonymous reader informs us that the Mozilla security blog is indicating that this vulnerability is not exploitable; denial of service is as bad as it gets.
Unbounded (Score:5, Funny)
So who's the moron using unbounded buffers?
Re:Unbounded (Score:4, Interesting)
Re:Unbounded (Score:5, Informative)
This is another, different bug than the one talked about in the first link. None of the other links specify whether this second bug is from the JIT or not.
Re: (Score:2)
Nothing requires unbounded buffers! Nothing at all. There are places where they're faster (right up until the whole thing goes down in flames or worse). At most, some things require segmented buffers that might have to be gathered later once the final size is known. Or you can just allocate a really large buffer and if it goes over that return "error: whoever said this could be arbitrarily large was wrong".
Of course, in this case it's the document.write method which has no excuse for not knowing the size in
Re:Unbounded (Score:5, Funny)
What are six words you never, ever want to hear?
"I have a headache tonight, dear"
Re:Unbounded (Score:4, Funny)
"wow, its so small and cute"
Re:Unbounded (Score:5, Funny)
A: Firefox users (Score:4, Funny)
If you use firefox, then you are the moron using unbounded buffers.
Re: (Score:2)
Good question. I don't see any unbounded buffer use here. Do you?
Re:Unbounded (Score:5, Funny)
I am shocked, shocked, to find unbounded buffer use in this open-source application.
--
Toro
Re: (Score:2)
Again, do you actually see any?
Re:Unbounded (Score:4, Funny)
Again? That was my first reply, and it's a joke referencing Casablanca. I can format it the other way, if you like:
I am shocked, shocked, to find half-baked misinformation on this Slashdot web-forum.
Your reply is a meme syntax error: Response Out Of Range: !Sense of Humor ;^)
--
Toro
That's notthe first time (Score:2)
But why on earth those friendly developers don't design, implement a damned solution to be used everywhere in the code???
Fix once, fix forever (until next smarter exploit).
Re:That's notthe first time (Score:5, Informative)
Have you tried the POC? Ideally under a debugger? It's a null-dereference crash due to failure to check an allocation for out-of-memory conditions. It's not exploitable, as far as I can see. And it's not a stack buffer overflow, by any means.
It'd be nice if these various security advisory services actually double-checked milw0rm postings before echoing them. Half the ones I've seen are in fact crashes, but not the sort the poster claims and not exploitable....
Re: (Score:3, Informative)
Worse POC evar
-----
<html>
<head>
<script language="JavaScript" type="Text/Javascript">
var str = unescape("%u4141%u4141");
var str2 = unescape("%u0000%u0000");
var finalstr2 = mul8(str2, 49000000);
var finalstr = mul8(str, 21000000);
document.write(finalstr2);
document.write(finalstr);
function mul8 (str, num) {
var i = Math.ceil(Math.log(num) / Math.LN2),
res = str;
do {
res += res;
} while (0 < --i);
return res.slice(0, str.
Re: (Score:2)
Well... That code _does_ crash the browser. Just not exploitably. ;)
Re: (Score:2)
Running this in Swiftfox 3.5.1 makes it eat all your RAM.
Ditto Opera 10. I had to kill Opera 10 though, I could close Swiftfox.
Re:That's notthe first time (Score:4, Interesting)
Fix once, fix forever
The bug is in the Just-in-Time compiler inside of SpiderMonkey (TraceMonkey). This is brand new code as of 3.5.x. Of course there will be a ton of bugs found in it (just like the ton of bugs that have cropped up in SquirrelFish and have been subsequently patched).
I have to wonder why it's taken so long for anybody's security team to look at this code though. You'd think they'd look at this code before release and not after.
Re: (Score:2)
Fix once, fix forever
The bug is in the Just-in-Time compiler inside of SpiderMonkey (TraceMonkey). This is brand new code as of 3.5.x. Of course there will be a ton of bugs found in it (just like the ton of bugs that have cropped up in SquirrelFish and have been subsequently patched). I have to wonder why it's taken so long for anybody's security team to look at this code though. You'd think they'd look at this code before release and not after.
I think the point is that there are auditing tools which can automatically detect this kind of buffer overflow in source code. There are also libraries which offer versions of various functions that automatically include bounds checking that can help to prevent this kind of buffer overflow. You'd think that basic fuzz testing might find it as well. So far as I know, no such tools were used. New code or old code should not meaningfully change this scenario because new code need not be released and versio
Re: (Score:2, Interesting)
I'm not saying valgrind, etc. are bad, only that sometimes they can be misleading.
Turn off javascript... (Score:5, Insightful)
... and stop using all of your web-apps... sigh...
Re:Turn off javascript... (Score:5, Insightful)
Yeah, and half the websites out there will stop rendering then. Sadly, the vast majority of them don't need javascript to do their job, but such is the epic lame that is the average web programmer.
Or maybe most web programmers don't want to spend a lot of time and money supporting the 1% of users out there that don't have or disable JavaScript.
I'm just sayin'.
Re:Turn off javascript... (Score:4, Insightful)
Wouldn't avoiding javascript make webpages smaller & therefore load faster? Perhaps you've got a megawide connection, but when I'm traveling all I have is 50k dialup. Even at home I'm limited to a relatively slow 700k. I'd prefer a web that's mainly text and images without the bloat.
Back in the 90s web programmers were taught to optimize and compress their pages as small as possible. It appears this lesson is no longer being taught in the schools.
Re:Turn off javascript... (Score:5, Interesting)
Wouldn't avoiding javascript make webpages smaller & therefore load faster?
Nope. To the contrary, a well-designed AJAX page that dynamically reloads sections instead of the entire page can potentially be much faster. Take the example of registering for a site account. Old way:
New way:
Alternatively, look at Slashdot itself. Yeah, it has its issues, but I have to say that I love the dynamic content loading. That's so much better (and easier on bandwidth!) than having to load a whole page just to expose a collapsed comment.
Re: (Score:3, Insightful)
New way:
You left off step 0 - the server sends over a ton of javascript code that would not be transfered in the non-javascript case. Since neither case requires the retransfer of any of the images, it is easy enough for your example to go either way based on just how much extra javascript gets transferred.
Furthermore, way too many sites have external javascript dependencies, like doubleclick, coremetrics, etc. By ignoring those we are pretty much guaranteed a faster experience.
Alternatively, look at Slashdot itself. Yeah, it has its issues, but I have to say that I love the dynamic content loading. That's so much better (and easier on bandwidth!) than having to load a whole page just to expose a collapsed comment.
Well, we are going to have agree to
Re:Turn off javascript... (Score:5, Informative)
Looking at W3Schools stats on it it's about 5%. I've seen some stats suggest as high as 16% around 3 years ago:
http://www.w3schools.com/browsers/browsers_stats.asp [w3schools.com]
I feel Javascript is an important technology and rather than fucking around with all the proprietary crap like Flash we should be strengthening Javascript so it's more secure and more useful, in fact, a lot of browser vendors seem to be doing this, and those Chrome demos posted a few months back were agood example.
But I also think it's silly to assume and design for Javascript unless Javascript is the whole point of your site. There's so many sites out there that use Javascript for things like drop down menus and sometimes even positioning where CSS would suffice and not require Javascript support it's silly. To turn away 1 in 20 users doesn't seem the brightest idea unless you're building a web application where absolutely the only way to do what you want to do is to use Javascript.
Javascript shouldn't be a requirement for the vast majority of the web, only for those sites that truly need it.
Re: (Score:3, Interesting)
But I also think it's silly to assume and design for Javascript
According to 95% [w3schools.com] of users have JS on. There's no reason to essentially design two separate sites to support the other 5%. And it could be argued that that 5% could either easily turn it back on if they choose (in which case, they're the lazy one), or is using something really really old and has no need to, or doesn't want to.
I'm not a web developer, but it seems obvious to me that while it's possible and often sensible to include the other 5% (which may include spiders, which you typically want), ignoring t
Re: (Score:3, Interesting)
>>>But the 95% percent of people with functioning browsers might appreciate those features
Nearly all those persons aren't even going to notice the difference between a Javascript dropdown menu and a CSS dropdown menu, so why bother with the larger JS version? I say follow the KISS principle - use CSS.
>>>why do the people stuck in 1996
That's not really the issue. Even today in 2009 there are people using slow dialup, satellite, or 500k DSL connections. You design your site so it loads q
Re: (Score:2)
Yeah, and half the websites out there will stop rendering then. Sadly, the vast majority of them don't need javascript to do their job, but such is the epic lame that is the average web programmer.
Or maybe most web programmers don't want to spend a lot of time and money supporting the 1% of users out there that don't have or disable JavaScript.
I'm just sayin'.
I'm finding a lot of sites now using javascript for simple image display. Not even progressively enhancing a basic grid with jQuery, just a simple 3x2 grid (or whatever) of images. Javascript for that, really?
I'm a web designer. I can't understand the rationale for such a design choice.
Re: (Score:2)
I'm finding a lot of sites now using javascript for simple image display. Not even progressively enhancing a basic grid with jQuery, just a simple 3x2 grid (or whatever) of images. Javascript for that, really?
Could be worse: I'm finding more and more sites using _Flash_ for simple image display. That makes even using Javashit look good in comparison.
Re: (Score:2)
Or maybe most web programmers don't want to spend a lot of time and money supporting the 1% of users out there that don't have or disable JavaScript.
Last I checked the figure was more like 3%, and included all standard desktop users at a number of very large and important companies, mainly in the financial sector. Admittedly that was a couple of years ago.
Also, if users without javascript can't navigate your site, neither can googlebot et al.
Re: (Score:3, Insightful)
That's not really the point. Most websites are built on a lot of different client-side technologies. HTML, CSS, JavaScript, Flash, and god knows what else. And you're not implementing for just the few technologies you use, but for all four or five implementations of each technology by different major browsers. So if you use HTML/CSS/JavaScript
Re: (Score:2)
I've disabled it today and some sites are now really much faster than usually.
I guess I really need to invest into configuring noscript.
Re:Turn off javascript... (Score:5, Insightful)
I've disabled it today and some sites are now really much faster than usually.
I guess I really need to invest into configuring noscript.
NoScript + Adblock Plus + Adblock Plus Element Hiding Helper + the Easylist and EasyElement subscriptions for ABP = the Web as it was meant to be.
Advertising business models and entitlement mentalities (regarding ad revenue) be damned. If a Webmaster somewhere does not like that my computer is my property and will load only what I want it to load up, I recognize that their site is their property and I celebrate their right to deny me access to their site so I can find another.
Re: (Score:3, Insightful)
Whereas entitlement mentality regarding access to other people's content is fair game, right?
Way to entirely miss the fact that I addressed this point. Really now, reading comprehension is important. You may laugh at me for saying that, but really it seems to be on the decline. I often feel on online forums, including those which are far less trollish than this one, that there are two versions of my posts: the one I actually wrote that says what it says and doesn't say what it doesn't say, and the fictitious one to which someone else is responding. Considering the quality of most public educat
Re: (Score:3, Interesting)
I don't think you wasted your time as I quite agree that each party (server & content reader) has a right to only provide/accept according to their wishes. That is the defining characteristic of the Internet, not just the web. A great example is NNTP which is currently under fire as well since the puditocracy and politickians just don't get it.
More to the point, as you've noticed, there is a definite lack of capability in the realm of critical thinking in the US, and it seems to be spreading. It w
Re: (Score:3, Interesting)
True. The whole emotional outrage that anyone would block ads is easy t
Re: (Score:2)
You gotta keep up, guy. Giorgio explains in detail.
http://hackademix.net/2009/05/04/dear-adblock-plus-and-noscript-users-dear-mozilla-community/ [hackademix.net]
Re: (Score:2)
Actually, I had some issues where I was forced to use Javascript on a website for no better reason than staying compliant with XHTML 1.1. I wanted to do something that was perfectly possible to do with only HTML 4 (no JS), but was not possible with XHTML 1.1 without either breaking the standard compliance, or using JS.
I'm not sure, but I think I wanted a link to open on a new window. But it is entirely possible it was something else.
You can't be serious! (Score:4, Insightful)
I don't know anything about JavaScript or Firefox internals, but a public sounding central function call like "DOCUMENT.WRITE" having a length related buffer overflow is just unacceptable. This call is used all the time right? How could this be missed?
Re: (Score:3, Insightful)
This is my feeling as well. FYI: document.write is the JavaScript equivalent of write(2). It is used liberally in modern web content; I doubt there are any popular contemporary pages that don't use it.
This code path should be impervious to any overflow exploit that might conceivably appear. Obviously document.write can and is used to exploit other more subtle flaws in a browser as it is capable of producing arbitrary document content, but that's not what we have here. Here we have long strings breaking
Re: (Score:2)
Aside from ads (where document.write() is relatively common), use of document.write is quite rare. The main reason is that document.write is largely useless after the page has loaded.
Perhaps you're thinking of elem.innerHTML? The use of which is extremely common.
Re: (Score:2)
About the only place this is used is to inject ads, and tracking for 3rd party servers. Very few sits use this technique internally. Most modern development uses avstraction libraries which inject DOM nodes, or use innerHTML for post-render injection. it's actually pretty bad-form to rely on inline document.write functionality because of browser behavior.
Re: (Score:2)
abstraction libraries even... damned tiny laptop keyboard.
Re:You can't be serious! (Score:5, Informative)
It's not a buffer overflow. It's a missing OOM check leading to a non-exploitable (well, if your kernel is sane; some Linux versions are not) null-dereference crash.
Note also that the article linked to is misreporting this in other ways as well; unfortunately I'm not at liberty to go into details on that yet. :(
Re: (Score:2)
Not at liberty? Isn't Firefox open source?
Re: (Score:2)
Yes, it is. That's not related to the issue at hand.
Re: (Score:2)
Not at liberty? Isn't Firefox open source?
He may have voluntarily agreed to hold off discussing a related known problem until it is fixed. I've done that a few times for other software (no, I don't feel like telling you what even though the fixes have been done for many years now) and with responsive OSS projects - either because they've got someone who really cares about this sort of thing, or because they've got lots of effort anyway - such issues tend to get fixed very rapidly. To be fair, that's true of the good commercial developers too; nobod
Re: (Score:2)
You see... right there is the cause of this crap. A "missing OOM check" IS A GOD DAMN BUFFER OVERFLOW.
No it's not: from what's been said here it's an out of memory error. In most cases if you run out of memory you get a NULL pointer back and you then access it and crash; it's possible that you allocate an 8GB buffer and then write 4GB into it which just happens to be where your stack is, but very, very few programs will do so... the vast majority will start writing at or near offset zero from the pointer they were allocated, and then the OS will kill the process if the pointer was NULL.
Now, not checking for
Re:You can't be serious! (Score:5, Informative)
Ok, here's the full deal:
1) The crash is not exploitable, for anyone who's been able to reproduce it so far.
2) The crash is in system text-rendering libraries (which apparently don't check for
out-of-memory much), not in Firefox code, for everyone who's been able to
reproduce it so far.
Re: (Score:2)
Many eyes makes for secure code (Score:4, Insightful)
Let's just hope that all those eyes are friendly. How many black hats are scouring the source code to generate exploits to sell underground? As quickly as Firefox releases patches, when these bugs aren't reported it's no better than a proprietary browser.
Re: (Score:3, Interesting)
Let's just hope that all those eyes are friendly. How many black hats are scouring the source code to generate exploits to sell underground? As quickly as Firefox releases patches, when these bugs aren't reported it's no better than a proprietary browser.
Except that other people are a lot more likely to find the same bug, and report it regardless of the black hats.
The code may not be that relevant (Score:3, Interesting)
After all, FF is open during development, not just after release. 3.5 has been a long time in coming, the code has been out there for lots to see and lots have looked, yet this was missed.
The thing is, open or closed, any major project has a lot of people looking at the code, and at least some of those people, perhaps most, are highly skilled. What this means is that it isn't likely there's an extremely obvious bug in the code. It isn't the sort of thing that someone would look at the source and go "Oh look
failed proof of concept (Score:3, Informative)
It looks like the proof of concept only shows how this could lead to a stack overflow. There is no concept about how this could lead to code execution, which makes this just just another way to crash a browser.
Crashing browsers is of course potentially a problem, but it quite boring while there are still so many ways to do real exploits.
Re: (Score:2)
Fool! A stack overflow can, by merits of exactly what it is, lead to code execution!
Re:failed proof of concept (Score:4, Informative)
> It looks like the proof of concept only shows how this could lead to a stack overflow
It actually doesn't even show that, if you try running it under a debugger... It shows a null dereference due to lack of out-of-memory check on an allocation.
fix: (Score:5, Funny)
Re:fix: (Score:5, Funny)
I tried this using greasemonkey and wanted to thank you for it, but I had to switch to Internet Explorer to post the reply as for some reason Slashdot started bringing up a million alert boxes.
Expect to see much more of this in the future.. (Score:3, Insightful)
Mang, sometimes I wish I could still get by with a browser that doesn't support JS at all, but web devs insist on building websites that absolutely require JS. For example the free SMS service for my mobile phone network (Meteor) absolutely won't work with JS disabled.
Re: (Score:2, Insightful)
I don't know why you hate web applications so much but I agree that Javascript is a horrible language. The specification is gigantic and the language is overcomplicated.
Lua [lua.org] makes a much better Javascript than Javascript. Small, lightweight and fast. Besides the syntax differences Lua is otherwise semantically very similar to Javascript except with a much better design... and Lua does it with a minuscule language syntax and VM.
Re: (Score:2)
The problem is that no one is going to switch to another language unless all the major browsers support it.
People have tried to promote alternatives before (TCL and VBScript at least, probably a lot more I do not know about), but they never got anywhere.
Re:Expect to see much more of this in the future.. (Score:4, Insightful)
Whoever modded the parent as troll is a moron. Offtopic maybe, but not troll. Go ahead and mod me down too.
The parent is right. I've had my paranoid period and tried NoScript; the web was so damn broken, and clicking to allow JS over and over again turned so tiresome that I turned to everything whitelisted by default, and finally uninstalled NoScript after the AdBlock fiasco.
About how bad of a language JavaScript is or isn't: I personally like it, though I'd prefer Lua, or say, Python; but JS is here to stay and it serves its purpose. Except that purpose isn't replacing HTML, or turning HTTP into something it was never meant to be. Back when I was coding JS, we were doing it to improve the user experience, not replace it altogether. Nowadays "web developers" use [insert random JS framework] for everything, but the problem is so, so many use it in braindead ways. You middle click on a thumbnail expecting to open the image in a new tab, but you just get the same page with a nice # added at the end. And then there's the idiots doing <a href="javascript:">, and the utter idiots with an attitude that do onclick="submit_something_via_post" and figure out they know better how the web is supposed to work... These are usually the same idiots that will do broken browser detection based on the User-Agent string, and usually fail miserably if your browser sends along "Gecko", but not "Firefox". Say, something like "Iceweasel". For a nice example of how far this stupidity goes, try browsing VIA's site.
You want to use XHR when clicking on a link? Or submitting a form? That's all fine and dandy, but don't break the web. It's becoming more and more like flash, with the sole difference you can view-source.
If you're building Google Docs or Meebo, all hail JavaScript. But for mostly everything else, lack of graceful degradation with JS disabled is pure idiocy. Not just because there's paranoid people browsing with JS disabled, but because there's blind people using the web, and people with antiquated handhelds, or simply stuck in a console trying to fix nvidia's latest fuck-up. Of course, it would take building the site / web app properly from the bottom up: HTML, server interaction, CSS, JavaScript. But the "developers" these day start with YUI or Dojo: some shiny animation is the end purpose in on itself, not an improvement to conveying information.
By the way: did you try GMail with JS disabled? It works. It probably works in lynx too, since it works in elinks just fine. That's the way JS is supposed to be used.
</rant>
Not just Firefox? (Score:5, Informative)
Re:Not just Firefox? (Score:4, Informative)
When I tried this, I see Firefox crashing with a null dereference. So not exploitable.
Do you see something different?
Re: (Score:2)
Re: (Score:3, Informative)
Well, the fact that SANS is blindly reposting known-unreliable things like milw0rm postins is something of an event, to me... Forgetting the fact that it tarnishes the reputations of whatever software they falsely accuse of being vulnerable, it leads to SANS being less reliable and less trusted. The whole crying wolf thing.
But yeah, I agree that this "exploit" is nothing of the kind.
Re: (Score:3, Interesting)
It crashes FF 3.5.1 and Safari 4.0.2 for me, but not Chrome 2.0.172.37 or IE 8.
automate protection (Score:4, Interesting)
These recurring requests to turn off something are getting annoying. Why not automate the process? Set up a page somewhere like
www.mozilla.com/firefox/3.5.1/current-safety.txt
which would list something like
javascript: unsafe
java: safe
flash: safe
Then by default your browser would fetch that file and automatically implement Mozilla's recommendation of the day.
No Javascript? No Firefox. (Score:3, Informative)
To say, for the contemporary web, "turn off javascript", is to say, "break everything". If I can't safely use the browser with Javascript, I can't safely use the browser.
Re: (Score:2)
I already replied in this thread, but wish I had mod points.. just the same, noscript is a pretty decent solution, as long as the sites you use detect/prevent user injection of js.
Firefox sucks (Score:5, Funny)
This is the reason why I avoid crappy software like Firefox and stick to MSIE! Firefox is riddled with bad, bloated code making it easily subjectable to these types of attacks. On top of that, the development model allows mistakes like this to get into the codebase without proper quality assurance.
If I have to /sarcasm, I will kill you.
Firefox Vulnerability (Score:3, Funny)
But, but, but, that's unpossible!
no evidence that this is exploitable (Score:2)
Run Linux Firefox with AppArmor (Score:2, Informative)
NoScript (Score:2)
Again, I think the NoScript UI should be part of the core Firefox product.
Yes, there are many sites that require JavaScript. That's the point of NoScript--you can enable JavaScript for just the source domains you trust (e.g. Facebook), in a couple of clicks, and leave it disabled for all the other random sites you browse.
And of course, the NoScript functionality would remain off by default, so naive users wouldn't be confused by it. Just like the functionality to not download images is off by default.
Re: (Score:3, Funny)
You did not just say that. Tell me you did not just say that.
Re: (Score:3, Funny)
I'm not aware of any malware having been launched from facebook.com.
bug misreported, not exploitable, not a stack over (Score:3, Informative)
not exploitable (Score:5, Informative)
Re:Defective by design (Score:5, Interesting)
Re: (Score:3)
It's safe to say that the meme has been co-opted. It seems to pop up in a fair number of articles these days.
Re: (Score:2)
It's not a meme [wikipedia.org], though. Or, at least, it's not supposed to be.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2, Informative)
Really? Taking a look at stories that have the defectivebydesign tag [slashdot.org] there are DRM stories as you point out. However, look at some of the stories in there:
* Critical security hole in Linux Wi-Fi
* Apple issues patches for 25 security holes
* Very severe hole in Vista UAC design
* Surprise, Windows listed as most secure OS
* Vista worse for user efficiency than XP
* Loophole in Windows random number generator
* Remote exploit of Vista speech control
* SP1 unsuccessful in preventing Vista hacks
* Data loss bug in O
Re:Defective by design (Score:5, Insightful)
http://slashdot.org/tags/defectivebydesign [slashdot.org]
Some stories tagged "defectivebydesign" that are not at all related to DRM:
"Critical Security Hole in Linux Wi-Fi" .MOV + Toshiba + Vista = BSOD"
"Apple Issues Patches For 25 Security Holes"
""Very Severe Hole" In Vista UAC Design"
"MS Responds To Vista's Network / Audio Problems"
"Apple's IPhone 3G Firmware Update Bombs"
"QuickTime
"Vista Slow To Copy, Delete Files"
"Vista Runs Out of Memory While Copying Files"
"Mark Russinovich On Vista Network Slowdown"
"Microsoft Knew About Xbox 360 Damaging Discs"
"Vista Not Playing Nice With FPS Games"
That's as far as I can be bothered to read. Go look at it yourself. That tag is cheerfully applied to many, many stories about Windows or Apple bugs.
Re:Defective by design (Score:5, Insightful)
A simple heuristic: if you can submit a well-written bug report and at least an attempt is made to fix the issue, it's probably not a design flaw.
Re: (Score:2)
As far as the Vista stories go, the network/copying/audio issues had to (or were believed to at the time) do with the DRM laden audio chain.
Re: (Score:2)
Plenty of those posts are about explaining what is actually going on, yet they are still tagged defectivebydesign.
Re: (Score:2)
Most of those could be argued to be hinting at the the Blu-ray-related DRM present in Vista and newer MacBooks. And the iPhone is a closed system. There's an earlier post with some examples completely unrelated to DRM, and I think in those cases it's a case of the person knowingly using it as a joke to say that whichever commercial os is referenced in the headline is never going to be any good.
As that happens more, it could mean the end of DbD as a DRM flag and just people using it because they heard it onc
Re: (Score:2)
Most of those could be argued to be hinting at the the Blu-ray-related DRM present in Vista and newer MacBooks.
No, none of them are. There are other articles about that, but the ones I picked aren't.
Re:Defective by design (Score:5, Insightful)
The primary difference being that bugs like this Firefox flaw are accidental and unintentional, whereas DRM is quite deliberate hence the "defective by design" nomenclature. That's such a sharp contrast, it's reasonable to assume that someone who fails to notice it is either speaking of what they know nothing about or purposely trolling. In other words, "highly advanced incompetence is indistinguishable from malice."
There were two ideas mentioned by GP, which were the "defective by design" label and the security reputation of IE. It's useful to know where those perceptions come from whether or not you actually agree with them. I'll make a very simplified (and therefore imperfect) summary of what I perceive as their bases.
The only reason why I see such a concept as "defective by design" applied to IE is a vague one. IE (and Microsoft in general) has something of a history of implementing ideas that were predictably unsound, the most notorious of which is probably ActiveX. That's mostly because ideas which are computationally sound are often orthogonal to ideas which are most easily marketed. True to the nature of a corporation, whenever these two are in conflict, the marketing concerns will win. This is where that perception of closed-source (that is, commercial) software that the GP mentioned comes from.
ActiveX is running untrusted code from a hostile network with no sandboxing and with the full privileges of the user running the browser. Before a single line of code is ever written to implement this, you can predict in advance that this is an unsound idea which invites trouble. Microsoft wrote the code and implemented the idea anyway. IMO that was a deliberate business decision because they felt the marketing and promotion of $SHINY_FEATURE would gain them more than they would lose from the PR problems of security issues. Because of how ignorant the general public tends to be about computer security, such decision-making has been largely successful. In other words, the people at Microsoft are not a bunch of idiots who didn't know what they were dealing with. They knew and they made their decision. Still, it's better to call that "faulty design" and "poor priorities" than to hijack a very specific term like "defective by design."
Re: (Score:2)
Well, at this stage, no evidence Firefox is defective by design, or that this bug is a result of a design defect.
And thus the problem of slashdot tagging. The tags show up on articles as if they were part of its text or an officially sanctioned categorization of the article.
And yet the tags require no justification, and users who don't understand what some of the tags are normally used for often apply them liberally to articles that have nothing to do with the marking.
Take a look at some of the articles that get tagged DRM [slashdot.org]: "Ford To Introduce Restrictive Car Keys For Parents", "Massive VMware Bug Shuts Systems Down"
Last I checked, DRM wasn't a general word for all restrictive computer systems. Only computer systems that manage rights to digital content (music and video) by encrypting, preventing copying, and (sometimes) phoning home.
The result? The tags end up being regarded as "just someone's opinion" like all other content (both online and in major media) should be regarded until demonstrated to have a basis in fact. So I would call this a self-correcting system.
Offtopic: I wonder if it's unusual that I have never, ever, not once, added a tag and then reloaded the Slashdot page and seen my tag in place. This has been the case for both commonly-occurring tags and unusual "more creative" tags.
Re:Just patch it and let's move on. (Score:4, Insightful)
FTFA: The vulnerability was reported to SecurityFocus (BID 35707) on July 15.
4 days > 24 hours.
Re: (Score:3, Funny)
Re: (Score:3, Insightful)
No... (Score:2)
Even if firefox is triggering it, it's clearly an issue with Xorg itself. Firefox, nomatter how crappy, should not be able to take out X.
Two words: (Score:2)
Welll. It is like aids (Score:2)
Aids is very dangerous virus that can strike anyone who has sex. A true danger.
But you are on slashdot. You ain't having sex.
Be honest, how many "odd" sites do you visit? How many slutty url's do you follow home?
The danger really depends on what you do. I know people who follow any link, open any email and click on anything in sight. It is amazing what they can do to an innocent virgin computer in just a week.
This bug is already highly overrated, lots of people have tried and so far it only results in c