"High-priority" Firefox patch being readied

A new patch for Firefox is being readied for shipment early next week to fix a vulnerability detected on Wednesday.

The update to the popular browser, version 3.0.8, has been deemed by Mozilla to be a "high-priority fire-drill security update," owing to the seriousness of the flaw. The update is expected to be released Monday or Tuesday.

The newly discovered, unpatched flaw -- for which researcher Guido Landi publicly has posted exploit code -- provides an opening through which attackers can enter Firefox source code and modify it. If a Firefox user simply views a maliciously coded XML file on a website, in a style of attack known as a drive-by download, the exploit installs unwelcome software onto the victim's machine.

The drive-by download affects Firefox running on all platforms, including Mac OS and Linux, according to Mozilla developer notes.

Browser exploits are nothing new. At last week's CanSecWest security conference in Vancouver, British Columbia, a "single-click-and-you're-owned exploit,” was unveiled in the newest release of Microsoft's browser, Internet Explorer 8. Bugs also were unveiled in Firefox and Safari browsers, although Google's Chrome survived unscathed.

"This makes the second big exploit of Firefox in a week," Tyler Reguly, senior security research engineer at nCircle, told SCMagazineUS.com on Thursday. "And it's the fifth bug in a popular browser over the last week-and-a-half."

The real issue is that end-users are running their computers as administrators, which enables an attacker to run code on a victim's machine, he said.

"It's a dangerous situation," he said. "When a person buys a computer...with Windows XP, that computer will be set up with 'admin' privileges. This opens up the computer to more damage when it's exploited."

A solution Reguly recommended is to run browser sessions that are contained within a virtual machine.

"This method completely segments web browsing from your personal files," he said. "If an exploit does make its way in, a user can revert to a clean position. This mitigates issues with browser exploits, including being linked into a botnet."

Other expert recommendations to prevent this type of exploit include running Firefox in 'restricted' mode, and to use the NoScript add-on for Firefox. This prevents JavaScript from running until the user allows it.

close

Next Article in News

Sign up to our newsletters

More in News

Bitcoin mining botnet has become one of the most prevalent cyber threats

Fortinet researchers have tracked 100,000 new ZeroAccess trojan infections per week, making the botnet very lucrative to its owners.

House Intelligence Committee OKs amended version of controversial CISPA

House Intelligence Committee OKs amended version of controversial ...

Despite the 18-to-2 vote in favor of the bill proposal, privacy advocates likely will not be satisfied, considering two key amendments reportedly were shot down.

Judge rules hospital can ask ISP for help in ID'ing alleged hackers

Judge rules hospital can ask ISP for help ...

The case stems from two incidents where at least one individual is accused of accessing the hospital's network to spread "defamatory" messages to employees.