Update: Mozilla patches six Firefox vulnerabilities
Firefox 3.0.13 fixes SSL flaws divulged at Black Hat; 3.5.2 plugs known SOCKS5 hole
Computerworld - Editor's note: This story has been updated with more complete information from Mozilla.
Mozilla on Monday patched Firefox 3.5 and Firefox 3.0 to quash six security vulnerabilities, including two unveiled last week at Black Hat and a third Mozilla itself revealed last month.
Firefox 3.0.13, the update to the older browser that Mozilla will drop off the support list in January 2010, repairs three bugs, while Firefox 3.5.2 fixes four. The disparity between the final total and the sub-totals for each version results from a one-patch overlap between 3.0.13 and 3.5.2.
Two of the vulnerabilities patched by Firefox 3.0.13 were disclosed last Thursday by Dan Kaminsky of IOActive, and a security consultant who calls himself Moxie Marlinspike, at Black Hat.
Independently, Kaminsky, best known as the discoverer of the DNS (Domain Name Server) vulnerability last summer, and Marlinspike demonstrated how hackers could exploit flaws in browsers' implementation of SSL (Secure Socket Layer), the Web's default encryption protocol.
Attackers could hijack a Web session to steal critical passwords or trick Firefox users into accepting a bogus software update that contained malware.
Firefox 3.5 was already safe from such attacks, since Mozilla's developers had used a newer, more secure version of NSS (Network Security Services), a set of code "libraries" for baking SSL into browsers.
Mozilla also quashed a bug in 3.0.13 that could be used by identity thieves to spoof the URL in Firefox's address bar. The company pegged the flaw as a "moderate" danger.
Mike Beltzner, director of Firefox, explained why the SOCKS5 bug fix didn't make it into the July 16 Firefox 3.5.1, even though it shipped before 3.0.12.
"Firefox 3.5.1 was a fast-turn release to patch a critical security issue that had been publicly disclosed, putting active users at risk," Beltzner said in an e-mail reply to questions. "A patch for the SOCKS5 issue -- which was a non-critical security issue, as no memory corruption was possible -- was not yet available for the Firefox 3.5 branch, so we chose not to hold the Firefox 3.5.1 release for that issue, as it would unduly delay releasing a fix that would protect users from a more critical issue."
According to Web metrics company Net Applications, Firefox accounted for 22.5% of all browsers used worldwide during July. About three out of four Firefox users are still running 3.x, not the newer 3.5.
Firefox 3.5.2 and 3.0.13 can be downloaded for Windows, Mac OS X and Linux, but current users can also call up the browsers' updaters, or wait for automatic update notifications to appear in the next 48 hours.
- 'Reveton'ransomware adds powerful password stealer
- Many Chrome browser extensions do sneaky things
- Kicking the stool out from under the cybercrime economy
- Symantec folds nine Norton products into one service
- Why would Chinese hackers want US hospital patient data?
- Senator questions airlines' data privacy practices
- About 4.5M face risk of ID theft after hospital network hacked
- SDS still young, but very much on the rise
- Startup builds intrusion prevention system for home networks
- Heartbleed software flaw exposes weaknesses in hardware design
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts