Attack Targets Mozilla

Discussion in 'Computers' started by Lefty Wilbury, Dec 13, 2005.

  1. Lefty Wilbury
    Offline

    Lefty Wilbury Active Member

    Joined:
    Nov 4, 2003
    Messages:
    1,109
    Thanks Received:
    36
    Trophy Points:
    36
    Ratings:
    +36
    http://news.yahoo.com/s/pcworld/200...FyYgS6s0NUE;_ylu=X3oDMTA3ODdxdHBhBHNlYwM5NjQ-

    Attack Targets Mozilla
    Robert McMillan, IDG News Service
    Tue Dec 13,10:00 AM ET


    Computer users who have not upgraded to the latest version of Mozilla's Firefox browser may now have an extra incentive to do so, thanks to a hacker who has posted an exploit.

    Exploit Shown

    On Sunday, a hacker going by the name of Aviv Raff published sample code that could be used to take over the computers of Firefox users running version 1.0.4 or earlier of the browser. The exploit takes advantage of a known bug in the way Firefox processes the popular Javascript Web programming language.

    "I think it's been enough time for people to upgrade from v1.0.4. of Firefox. So, here is the PoC [proof of concept] exploit for the... vulnerability," he wrote on his blog.

    The bug was fixed in Mozilla version 1.0.5, which was released during the summer, and has also been fixed in version 1.7.9 of the Mozilla Suite, said Mike Schroepfer, vice president of engineering with Mozilla. "As long as users keep updated to the latest version, they're, in general, very safe."

    Similar to IE Flaw

    In some ways, this latest exploit is similar to highly publicized attack code that has been circulating for the Microsoft Internet Explorer browser, said Russ Cooper, editor of the NTBugtraq newslist and a scientist with security vendor Cybertrust.

    "It can install and run code of the attacker's choice if a victim visits a malicious Web site," he said of the IE bug in an interview via instant message.

    Users who are not already in the habit of frequently updating their browsers should change their ways, because browsers are "historically broken," Cooper said. "That means they have vulnerabilities regularly," he added. "You should keep them updated within 30 days of patches being made available, regardless of what the patch is for."

    The IE code, which was published in November, takes advantage of a Javascript problem that has not yet been patched.

    Many security experts expect Microsoft to patch its Javascript bug on Tuesday, but the Redmond, Washington, software giant has not confirmed that this will be the case.
     

Share This Page