Feeds

Bugs casts shadow over Firefox 3

First day zero day bugs

Internet Security Threat Report 2014

Firefox 3 is only hours old but flaw finders have already located bugs in the browser bairn.

An unspecified flaw that creates a means to inject hostile code onto vulnerable systems affects both Firefox 3 and Firefox 2, TippingPoint warns.

The security tools firm has informed Mozilla and is holding off details of the mystery bug pending the availability of a patch. The vulnerability was submitted to TippingPoint through the vendor's controversial Zero Day Initiative, which provides financial rewards to researchers who discover new flaws, just five hours after the release of Firefox 3.0.

Meanwhile a minimalist posting on a full Disclosure security mailing list warns of a buffer overflow bug affecting Firefox 3.0. It's unclear whether the vulnerability is the same as that reported to TippingPoint though since the second report only refers to Firefox 3.0 it's tempting to speculate that the two are different.

Browser vulnerabilities, much like rising petrol prices and the inexorable progress of the Italian national team into the knock-out stages of major football competitions, are a fact of life. Hackers undoubtedly scoured the release candidate of Firefox 3.0 for bugs that they could announce soon after the official release of the software and we can expect IE 8 will get much the same fuzzing process as soon as it makes its way out of Redmond.

The discovery of the bugs is unlikely to dampen down enthusiasm for Firefox. An estimated 7 million downloaded copies of the browser in the first 24 hours of its release even though Mozilla servers struggled to cope with demand. ®

Remote control for virtualized desktops

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
State Dept shuts off unclassified email after hack. Classified mail? That's CLASSIFIED
Classified systems 'not affected' - but, is this reconnaissance?
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.