Since this exploit is Javascript based, I'm wondering if anyone knows if NS will protect FF 3.5 users?
http://www.computerweekly.com/Articles/ ... ox-3.5.htm
"Critical security hole in Firefox 3.5" Javascript based
"Critical security hole in Firefox 3.5" Javascript based
Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10.4; en-US; rv:1.9.1) Gecko/20090624 Firefox/3.5
- GµårÐïåñ
- Lieutenant Colonel
- Posts: 3369
- Joined: Fri Mar 20, 2009 5:19 am
- Location: PST - USA
- Contact:
Re: "Critical security hole in Firefox 3.5" Javascript based
Wasn't this already asked and answered here? http://forums.informaction.com/viewtopic.php?f=8&t=1953
or is this somehow something new?Giorgio Maone wrote:Yes it does.
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
________________ .: [ Major Mike's ] :. ________________
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1) Gecko/20090624 Firefox/3.5
Re: "Critical security hole in Firefox 3.5" Javascript based
That must be the one. Apparently NS will protect, but not against an allowed site if it's been hacked. Following change, which I made in about:config is recommended:
EDITED
And, from what I could gather no one is certain exactly what platforms are affected. Do you know if Mac is? Thanks.Setting the javascript.options.jit.content about:config preference to false mitigates this bug, since it is a TraceMonkey vulnerability.
EDITED
Last edited by kukla on Fri Jul 17, 2009 1:11 am, edited 1 time in total.
Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10.4; en-US; rv:1.9.1) Gecko/20090624 Firefox/3.5
- GµårÐïåñ
- Lieutenant Colonel
- Posts: 3369
- Joined: Fri Mar 20, 2009 5:19 am
- Location: PST - USA
- Contact:
Re: "Critical security hole in Firefox 3.5" Javascript based
Generally if you allow a page, the assumption is that you want it to do whatever. However, there are some things that NS protects against regardless of whether the site is allowed or not. Additionally, although MAC are not completely immune to malicious attacks, given they are used by a smaller group of generally sub-specialty group of people, it is not wide enough in range to be worth the exploit and most hackers won't waste their time with it.
This being said, generally Linux and Mac are fairly safe from the most "general' and broad of attacks (since they are often targeted to the most widely used windows platform to do the most damage and reach the most people) unless the exploit is of core function that is facilitated by a cross platform application like Fx that will cause the same result, in which case everyone is equally affected (again if its using an API present only in windows, then obviously it will fail in other OS regardless of how it is facilitated).
The worst thing a user can do is give into FUD and start taking actions they are not sure about which are more likely to open them up (done improperly) than to practice safe common sense browsing habits, take note of where you are going, what you are doing and take basic steps to protect yourself. You wouldn't just give your id to anyone who asks for it, would you? but that won't stop you from giving it to people who need to see it? What's the difference? use of common sense. Apply that to computing and you will be fine more times than not.
Any further specifics and I will let Giorgio comment on it and provide you with any examples he feels are relevant or important.
This being said, generally Linux and Mac are fairly safe from the most "general' and broad of attacks (since they are often targeted to the most widely used windows platform to do the most damage and reach the most people) unless the exploit is of core function that is facilitated by a cross platform application like Fx that will cause the same result, in which case everyone is equally affected (again if its using an API present only in windows, then obviously it will fail in other OS regardless of how it is facilitated).
The worst thing a user can do is give into FUD and start taking actions they are not sure about which are more likely to open them up (done improperly) than to practice safe common sense browsing habits, take note of where you are going, what you are doing and take basic steps to protect yourself. You wouldn't just give your id to anyone who asks for it, would you? but that won't stop you from giving it to people who need to see it? What's the difference? use of common sense. Apply that to computing and you will be fine more times than not.
Any further specifics and I will let Giorgio comment on it and provide you with any examples he feels are relevant or important.
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
________________ .: [ Major Mike's ] :. ________________
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1) Gecko/20090624 Firefox/3.5
Re: "Critical security hole in Firefox 3.5" Javascript based
Thanks for that. I made the above change in about:config, Was that a mistake, premature? Should I go back and reverse that? (Giorgio must be asleep by now.)
Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10.4; en-US; rv:1.9.1) Gecko/20090624 Firefox/3.5
- GµårÐïåñ
- Lieutenant Colonel
- Posts: 3369
- Joined: Fri Mar 20, 2009 5:19 am
- Location: PST - USA
- Contact:
Re: "Critical security hole in Firefox 3.5" Javascript based
That edit to your about:config is fine, you will not harm yourself and you can safely leave it in place. Its a bug that has been mitigated by NS already but that will ensure that you have an additional layer just in case.
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
________________ .: [ Major Mike's ] :. ________________
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1) Gecko/20090624 Firefox/3.5
Re: "Critical security hole in Firefox 3.5" Javascript based
And one final thing: is this still just a POC, i.e. nothing yet reported in the wild? Thanks again for help on this.
Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10.4; en-US; rv:1.9.1) Gecko/20090624 Firefox/3.5
- GµårÐïåñ
- Lieutenant Colonel
- Posts: 3369
- Joined: Fri Mar 20, 2009 5:19 am
- Location: PST - USA
- Contact:
Re: "Critical security hole in Firefox 3.5" Javascript based
Its not a wildfire, let's just say that, its out there and its used and the code is available but unlikely it will get out of hand. Its not coming up through internal Fx update but it is available on their site.
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
________________ .: [ Major Mike's ] :. ________________
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1) Gecko/20090624 Firefox/3.5
Re: "Critical security hole in Firefox 3.5" Javascript based
Fx 3.5.1 is out with a fix
Mozilla/5.0 (Windows; U; Windows NT 5.1; de; rv:1.9.1) Gecko/20090624 Firefox/3.5 Mnenhy/0.7.6.666
- GµårÐïåñ
- Lieutenant Colonel
- Posts: 3369
- Joined: Fri Mar 20, 2009 5:19 am
- Location: PST - USA
- Contact:
Re: "Critical security hole in Firefox 3.5" Javascript based
Yes I thought it was already stated but many didn't get it because it wasn't available through Fx update as of yesterday but it was available on their site if you wanted to get it that way.
~.:[ Lï£ê ï§ å Lêmðñ åñÐ Ì Wåñ† M¥ Mðñê¥ ßå¢k ]:.~
________________ .: [ Major Mike's ] :. ________________
________________ .: [ Major Mike's ] :. ________________
Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.1) Gecko/20090715 Firefox/3.5.1