Update: Mozilla patches six Firefox vulnerabilities
Firefox 3.0.13 fixes SSL flaws divulged at Black Hat; 3.5.2 plugs known SOCKS5 hole
Computerworld - Editor's note: This story has been updated with more complete information from Mozilla.
Mozilla on Monday patched Firefox 3.5 and Firefox 3.0 to quash six security vulnerabilities, including two unveiled last week at Black Hat and a third Mozilla itself revealed last month.
Firefox 3.0.13, the update to the older browser that Mozilla will drop off the support list in January 2010, repairs three bugs, while Firefox 3.5.2 fixes four. The disparity between the final total and the sub-totals for each version results from a one-patch overlap between 3.0.13 and 3.5.2.
Two of the vulnerabilities patched by Firefox 3.0.13 were disclosed last Thursday by Dan Kaminsky of IOActive, and a security consultant who calls himself Moxie Marlinspike, at Black Hat.
Independently, Kaminsky, best known as the discoverer of the DNS (Domain Name Server) vulnerability last summer, and Marlinspike demonstrated how hackers could exploit flaws in browsers' implementation of SSL (Secure Socket Layer), the Web's default encryption protocol.
Attackers could hijack a Web session to steal critical passwords or trick Firefox users into accepting a bogus software update that contained malware.
Firefox 3.5 was already safe from such attacks, since Mozilla's developers had used a newer, more secure version of NSS (Network Security Services), a set of code "libraries" for baking SSL into browsers.
Mozilla also quashed a bug in 3.0.13 that could be used by identity thieves to spoof the URL in Firefox's address bar. The company pegged the flaw as a "moderate" danger.
Mike Beltzner, director of Firefox, explained why the SOCKS5 bug fix didn't make it into the July 16 Firefox 3.5.1, even though it shipped before 3.0.12.
"Firefox 3.5.1 was a fast-turn release to patch a critical security issue that had been publicly disclosed, putting active users at risk," Beltzner said in an e-mail reply to questions. "A patch for the SOCKS5 issue -- which was a non-critical security issue, as no memory corruption was possible -- was not yet available for the Firefox 3.5 branch, so we chose not to hold the Firefox 3.5.1 release for that issue, as it would unduly delay releasing a fix that would protect users from a more critical issue."
According to Web metrics company Net Applications, Firefox accounted for 22.5% of all browsers used worldwide during July. About three out of four Firefox users are still running 3.x, not the newer 3.5.
Firefox 3.5.2 and 3.0.13 can be downloaded for Windows, Mac OS X and Linux, but current users can also call up the browsers' updaters, or wait for automatic update notifications to appear in the next 48 hours.
- Senator pushes new version of bill to limit NSA phone records collection
- How to Protect Personal, Corporate Information When You Travel
- Privacy groups call for Facebook to halt off site user tracking plans
- Using Instagram on public Wi-Fi risks account hijack
- Attackers install DDoS bots on Amazon cloud, exploit Elasticsearch weakness
- Mobile security: A mother lode of new tools
- Until the Tails privacy tool is patched, here's how to stay safe
- Russian gov't is willing to pay for a way to ID Tor users
- 11 signs you've been hacked -- and how to fight back
- Bugcrowd guide aims to smooth the way for reporting software flaws
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Fight Malware, Malfeasance and Malingering Every year brings more extreme sets of threats than the last. The good news is that there are a range of mitigation options....
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Malware and Vulnerabilities White Papers | Webcasts