Firefox users also vulnerable to ANI attacks

Share this article:

Researchers are warning users of Mozilla's Firefox browser that they are also vulnerable to attacks exploiting the animated cursor ANI bug.

Alexander Sotirov, researcher for the security vendor Determina who discovered the vulnerability, posted a demonstration online of an ANI exploit that hijacks a Windows machine using the Firefox web browser.

There is no flaw in the Firefox source code itself, but an attacker could exploit the Windows vulnerability using the application programming interface (API) feature in Firefox, Sotirov said.

Hackers are exploiting the ANI vulnerability, which was made public by Microsoft last week, but only for computers using Internet Explorer. Microsoft released an out-of-cycle patch on Tuesday to tackle the flaw.

"The reason for the confusion over Firefox is that an exploit that works against it has not become public," said Sotirov. "So in a sense, since there are no attacks in the wild. It is safer. But people should also consider that the bad guys will figure out how to exploit Firefox."

Sotirov advises users to refrain from using Windows API until they have installed the MS07-017 patch.

Mozilla representatives could not be immediately reached for comment.

 

 

Looking for a new job? SCMagazine.com has the latest IT security employment opportunities. Click here for our jobs page.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.