Firefox arbitrary code flaw found

Powered by SC Magazine
 

Researchers have discovered a new flaw in Mozilla's Firefox browser that can be exploited by attackers to take over a user's computer, as long as the victim also has Internet Explorer (IE) installed.

The flaw occurs when Firefox registers the firefoxurl:// URI handler, allowing an arbitrary command line argument to invoke the program, according to an advisory released today by Secunia.

The flaw can be used to execute arbitrary code when a user visits a malicious website using IE, which then opens a vulnerable Firefox, according to Secunia.

The flaw has been confirmed in Firefox version 2.0.0.4 on a fully patched Windows XP system with Service Pack 2. It was discovered by Billy (BK) Rios, Nate Mcfeeters, and Raghav "the Pope" Dube.

Secunia ranked the flaw as "highly critical," meaning it can be exploited to execute arbitrary code.

A Mozilla representative could not immediately be reached for comment.

According to a post on xs-sniper.com, Rios, Mcfeters and Dube said that the flaw can be exploited when parameters that are part of firefoxurl: are passed to Firefox.exe as options, without validation.

"By using the firefoxurl URI, it is possible to use Internet Explorer (or other Windows-based browsers) to launch Firefox and immediately launch Javascript code," the researchers said.

In an advisory released today, FrSIRT ranked the flaw as "critical."

Researcher Thor Larholm detailed a proof-of-concept exploit for the flaw on his website. He later commented that Firefox URL handler was only added to the browser in version 2.0.0.2 so that it would be compatible with Vista.


Firefox arbitrary code flaw found
 
 
 
Top Stories
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
Microsoft confirms Australian Azure launch
Available from next week.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  24%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  27%
TOTAL VOTES: 298

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  59%
 
No
  41%
TOTAL VOTES: 109

Vote