Home Discord Chat
Go Back   ChiefsPlanet > Nzoner's Game Room

 
 
Thread Tools Display Modes
Prev Previous Post   Next Post Next
Old 05-09-2005, 02:40 PM   Topic Starter
Taco John Taco John is offline
Sapere Aude
 
Taco John's Avatar
 
Join Date: Jun 2001
Casino cash: $427937
FireFox Browsers Suceptible to Malicious Code... Here's the temp fix...

The fix: Users can protect themselves by temporarily disabling JavaScript, according to Mozilla.




The problem:


May 9, 2005
Two Holes Poke Firefox Veneer
By Tim Gray


It seems Mozilla's Firefox, the undisputed darling of the alternative browser set, isn't immune after all to the slings and arrows suffered by other popular interfaces.

On Saturday the Greyhats Security Group punctured the browser's aura of invincibility after it released details of two flaws that allow a malicious site to execute arbitrary code.

The advisory explains that the successful attacks involve two elements. The first flaw fools the browser into thinking software is being installed by a "whitelisted site." The second flaw occurs when the software installation trigger does not sufficiently check icon URLs containing JavaScript code.

Users can protect themselves by temporarily disabling JavaScript, according to Mozilla.

Less than a week after the foundation trumpeted breaking the 50 million download mark, the browser is dealing with what has been called by Danish security firm Secunia its first "extremely critical" bug.

The Mozilla Foundation said there are currently no known active exploits of these vulnerabilities, although a "proof of concept" has been reported.

Greyhats said an attacker can first use frames and a JavaScript history flaw to make it appear that a software installation is being triggered from add-ons.update.mozilla.org.

As the JavaScript is executed from the chrome, it has "full chrome privileges" and can "do anything that the user running Firefox can."

"Mozilla is aggressively working to provide a more comprehensive solution to these potential vulnerabilities and will provide that solution in a forthcoming security update," the foundation said on its Web site.

Numerous security outfits agree with the foundation's suggestions of disabling JavaScript as a workaround.

"We believe this means that users who have not added any additional sites to their software installation whitelist are no longer at risk," Mozilla Foundation said in a statement.


http://www.internetnews.com/security...le.php/3503506
Posts: 79,768
Taco John is obviously part of the inner Circle.Taco John is obviously part of the inner Circle.Taco John is obviously part of the inner Circle.Taco John is obviously part of the inner Circle.Taco John is obviously part of the inner Circle.Taco John is obviously part of the inner Circle.Taco John is obviously part of the inner Circle.Taco John is obviously part of the inner Circle.Taco John is obviously part of the inner Circle.Taco John is obviously part of the inner Circle.Taco John is obviously part of the inner Circle.
    Reply With Quote
 

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On

Forum Jump




All times are GMT -6. The time now is 02:29 PM.


This is a test for a client's site.
Fort Worth Texas Process Servers
Covering Arlington, Fort Worth, Grand Prairie and surrounding communities.
Tarrant County, Texas and Johnson County, Texas.
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.