Page 1 of 1
Firefox Vunerability - Highly Critical - How can N.S help?
Posted: Thu Aug 26, 2010 9:01 am
by eradic8
How can NoScript help with this vunerability in Firefox?
http://secunia.com/advisories/41095
Re: Firefox Vunerability - Highly Critical - How can N.S hel
Posted: Thu Aug 26, 2010 5:16 pm
by therube
Re: Firefox Vunerability - Highly Critical - How can N.S hel
Posted: Thu Aug 26, 2010 9:43 pm
by darkassain
it would be very difficult to exploit as from what im seeing, you need to have IE go to the site to initiate a share, and then open the html (in the share) inside firefox to exploit it (basically you need user interaction, and cannot be exploited using simple html, (although idk, if this can be exploited by automation ala javascript, but then you see that noscipt stops it), basically unless you are on a corporate setting, you shouldnt worry, as long as take care in what you click in IE (and IE-tab as it is exploitable too) you should be fine
Re: Firefox Vunerability - Highly Critical - How can N.S hel
Posted: Fri Aug 27, 2010 9:06 am
by eradic8
darkassain wrote:it would be very difficult to exploit as from what im seeing, you need to have IE go to the site to initiate a share, and then open the html (in the share) inside firefox to exploit it (basically you need user interaction, and cannot be exploited using simple html, (although idk, if this can be exploited by automation ala javascript, but then you see that noscipt stops it), basically unless you are on a corporate setting, you shouldnt worry, as long as take care in what you click in IE (and IE-tab as it is exploitable too) you should be fine
What about using USB drive, as I understood it you are vunerable if you have one plugged in
http://www.networkworld.com/news/2010/0 ... ml?hpg1=bn
Re: Firefox Vunerability - Highly Critical - How can N.S hel
Posted: Fri Aug 27, 2010 2:04 pm
by Giorgio Maone
Keep Firefox running until you get updated to next Firefox version (which will contain a fix).
Firefox cannot be exploited while it's already running (you must open a malicious document causing Firefox to be started from the same directory, for the exploit to work).
Re: Firefox Vunerability - Highly Critical - How can N.S hel
Posted: Fri Aug 27, 2010 2:12 pm
by Alan Baxter
If keeping Firefox running until the next Firefox release -- currently scheduled for September 7 -- isn't practical, you can work around the vulnerability by starting Firefox from the Firefox icon instead of starting it by clicking on a link or malicious document.
Re: Firefox Vunerability - Highly Critical - How can N.S hel
Posted: Fri Aug 27, 2010 11:38 pm
by al_9x
The new MS
patch with CWDIllegalInDllSearch=2 prevents the loading of DLLs by local apps from remote CWDs (current working directories). But the safest solution which covers all potential vulnerabilities in this class is to completely block transparent file system access over the internet.
The following applies specifically to XP, but probably to newer windows as well.
There are two windows components that allow transparent folder (UNC) access to remote untrusted resources:
- Client for Microsoft Networks (SMB over TCP/UDP, port 445 & SMB over NetBIOS over TCP/UDP, ports 137-139). Client for Microsoft Networks can either be completely disabled (properties of the connection), or if needed for LAN sharing, either the router or local firewall can be configured to block outgoing TCP/UDP ports 137-139, 445 to the internet.
- WebCient service (WebDav protocol over http) - can be disabled through services.msc
Re: Firefox Vunerability - Highly Critical - How can N.S hel
Posted: Sat Aug 28, 2010 11:47 am
by therube
you need to have IE
Wrong.
VLC media player &
μTorrent (are at least two applications that) have fixed things on their ends.
When MS first published KB 2264107, the downloads were considered non-critical & you needed to verify authenticity first.
Re: Firefox Vunerability - Highly Critical - How can N.S hel
Posted: Sun Aug 29, 2010 12:07 pm
by tlu
A general solution against this type of attack is presented
here. The same can be accomplished with Applocker instead of SRP.
Re: Firefox Vunerability - Highly Critical - How can N.S hel
Posted: Sun Aug 29, 2010 2:32 pm
by therube
Re: Firefox Vunerability - Highly Critical - How can N.S hel
Posted: Sun Aug 29, 2010 3:38 pm
by tlu
I confess

Re: Firefox Vunerability - Highly Critical - How can N.S hel
Posted: Fri Sep 10, 2010 9:25 am
by darkassain
therube wrote:you need to have IE
Wrong.
VLC media player &
μTorrent (are at least two applications that) have fixed things on their ends.
When MS first published KB 2264107, the downloads were considered non-critical & you needed to verify authenticity first.
if you read my whole post you would have found out that
IE is need to initate a webdav share
whether or not VLC or Utorrent are patched or not does not pertain to the topic which you brought up, which is how the exploit is initiated, through a shared folder, of which you can only initiate through IE...