Feeds

Firefox JavaScript risk downplayed

Crash, bang but no exploit

Remote control for virtualized desktops

Update Flaws in the way Firefox handles JavaScript code only crash the browser (at worst), contrary to earlier reports that researchers had identified a zero-day exploit that might lend itself to malware-based attacks.

Researchers Mischa Spiegelmock and Andrew Wbeelsoi discussed the unpatched cross-platform vulnerability during a presentation at ToorCon hacker conference in San Diego last weekend. The stack overflow flaw said to be at the heart of the problem is down to Firefox's implementation of JavaScript which Spiegelmock described as a "complete mess". The hackers reportedly claimed the vulnerability was one of 30 security bugs in Firefox they knew.

Window Snyder, Mozilla's security chief, who witnessed the presentation on Saturday, initially suggested that that security bug illustrated by Spiegelmock and Wbeelsoi might be a variant of a well-understand attack. Snyder told News.com that she was uncomfortable that the researchers detailed possible exploits during their presentation, a common criticism by software vendors against security researchers against researchers who practice full disclosure.

After reviewing the flaw, Mozilla published a posting on its developer blog downplaying the seriousness of the bug, initially reported by El Reg and other news outlets as creating a means for hackers to execute hostile code on Windows, Mac OS X and Linux PCs. The posting contains an agreed statement by Spiegelmock in which the security researcher backtracks on claims made during the talk that Firefox was riddled with security bugs.

"As part of our talk we mentioned that there was a previously known Firefox vulnerability that could result in a stack overflow ending up in remote code execution. However, I have not succeeded in making this code do anything more than cause a crash and eat up system resources, and I certainly haven’t used it to take over anyone else’s computer and execute arbitrary code," the statement reads.

"I do not have 30 undisclosed Firefox vulnerabilities, nor did I ever make this claim. I have no undisclosed Firefox vulnerabilities. The person who was speaking with me made this claim, and I honestly have no idea if he has them or not."

Mozilla's Window Snyder adds in the posting that despite the reduced seriousness of the risk it was continued to investigate the issue. ®

Choosing a cloud hosting partner with confidence

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.