Crash, bang but no exploit
Window Snyder, Mozilla's security chief, who witnessed the presentation on Saturday, initially suggested that that security bug illustrated by Spiegelmock and Wbeelsoi might be a variant of a well-understand attack. Snyder told News.com that she was uncomfortable that the researchers detailed possible exploits during their presentation, a common criticism by software vendors against security researchers against researchers who practice full disclosure.
After reviewing the flaw, Mozilla published a posting on its developer blog downplaying the seriousness of the bug, initially reported by El Reg and other news outlets as creating a means for hackers to execute hostile code on Windows, Mac OS X and Linux PCs. The posting contains an agreed statement by Spiegelmock in which the security researcher backtracks on claims made during the talk that Firefox was riddled with security bugs.
"As part of our talk we mentioned that there was a previously known Firefox vulnerability that could result in a stack overflow ending up in remote code execution. However, I have not succeeded in making this code do anything more than cause a crash and eat up system resources, and I certainly haven’t used it to take over anyone else’s computer and execute arbitrary code," the statement reads.
"I do not have 30 undisclosed Firefox vulnerabilities, nor did I ever make this claim. I have no undisclosed Firefox vulnerabilities. The person who was speaking with me made this claim, and I honestly have no idea if he has them or not."
Mozilla's Window Snyder adds in the posting that despite the reduced seriousness of the risk it was continued to investigate the issue. ®
Sponsored: Benefits from the lessons learned in HPC