"High-priority" Firefox patch being readied

By

A new patch for Firefox is being readied for shipment early next week to fix a vulnerability detected this week.

The update to the popular browser, version 3.0.8, has been deemed by Mozilla to be a "high-priority fire-drill security update," owing to the seriousness of the flaw. The update is expected to be released Monday or Tuesday.

"High-priority" Firefox patch being readied

The newly discovered, unpatched flaw -- for which researcher Guido Landi publicly has posted exploit code -- provides an opening through which attackers can enter Firefox source code and modify it. If a Firefox user simply views a maliciously coded XML file on a website, in a style of attack known as a drive-by download, the exploit installs unwelcome software onto the victim's machine.

The drive-by download affects Firefox running on all platforms, including Mac OS and Linux, according to Mozilla developer notes.

Browser exploits are nothing new. At last week's CanSecWest security conference in Vancouver, British Columbia, a "single-click-and-you're-owned exploit," was unveiled in the newest release of Microsoft's browser, Internet Explorer 8. Bugs also were unveiled in Firefox and Safari browsers, although Google's Chrome survived unscathed.

"This makes the second big exploit of Firefox in a week," Tyler Reguly, senior security research engineer at nCircle, told SCMagazineUS.com. "And it's the fifth bug in a popular browser over the last week-and-a-half."

The real issue is that end-users are running their computers as administrators, which enables an attacker to run code on a victim's machine, he said.

"It's a dangerous situation," he said. "When a person buys a computer...with Windows XP, that computer will be set up with 'admin' privileges. This opens up the computer to more damage when it's exploited."

A solution Reguly recommended is to run browser sessions that are contained within a virtual machine.

"This method completely segments web browsing from your personal files," he said. "If an exploit does make its way in, a user can revert to a clean position. This mitigates issues with browser exploits, including being linked into a botnet."

Other expert recommendations to prevent this type of exploit include running Firefox in 'restricted' mode, and to use the NoScript add-on for Firefox. This prevents JavaScript from running until the user allows it.

Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Australia's super funds told to assess authentication controls

Australia's super funds told to assess authentication controls

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

CBA looks to GenAI to assist 1200 'security champions'

CBA looks to GenAI to assist 1200 'security champions'

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Log In

  |  Forgot your password?