Mozilla quashes first critical bug in Firefox 3.5, beats Microsoft to patch punch
Microsoft's IE ActiveX vulnerability, disclosed same day as Firefox's bug, not yet fixed
Computerworld - Mozilla late yesterday issued the first patch for Firefox 3.5, fixing a flaw that went public Monday. One noted contributor had called the flaw a "self-inflicted" vulnerability.
Exploit code for the vulnerability was posted to the Milw0rm.com malware site Monday, four days after Mozilla developers had discovered the bug and began working on a fix.
Andreas Gal, a project scientist at the University of California, Irvine -- and a key contributor to the TraceMonkey engine that Mozilla added to Firefox with Version 3.5 -- said that it appeared the hacker had created the attack code after spotting discussions and test cases on Bugzilla, Mozilla's bug- and change-tracking database. "Looking at the exploit code and our test cases, I think this is self-inflicted and we should have hidden the bug earlier," said Gal in one of several comments appended to the vulnerability's Bugzilla entry.
Although Mozilla had originally slated Firefox 3.5.1 for release later in the month, developers accelerated the schedule to plug the hole.
Thursday's update also addressed several unspecified stability issues and fixed a loading problem for some Windows users, according to Firefox 3.5.1's release notes.
Firefox 3.5.1 can be downloaded in Windows, Mac and Linux editions from Mozilla's site; current users can update by choosing "Check for Updates" under the "Help" menu.
While Mozilla rushed out a fix, rival Microsoft has yet to patch a bug that was publicly disclosed the same day -- Monday, July 13 -- that the attack code exploiting Firefox 3.5 hit the Web.
Hackers have been using a vulnerability in an ActiveX control used to publish Excel spreadsheets online and to display those in Internet Explorer, Microsoft's browser.
Microsoft has provided a tool that users can download, install and run that disables the ActiveX control -- and has provided instructions and tools for enterprises to do the same on a massive scale -- but it did not deliver a patch for the underlying problem Tuesday, its regularly scheduled monthly patch day.
"If you haven't set those kill bits yet, be sure that you do now, because the number of sites exploiting this vulnerability will probably rise exponentially soon," said Bojan Zdrnja, an ISC analyst, in a warning posted to the center's site. The "kill bits" reference is to the downloadable tool that Microsoft had created, which disables the ActiveX control by modifying the Windows registry.
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts