Firefox Fixes Three Security Flaws, Though More Remain

The vulnerabilities could be used to gather sensitive data from sites in other windows or inject data or code into those sites, Mozilla said.

Thomas Claburn, Editor at Large, Enterprise Mobility

November 27, 2007

2 Min Read
InformationWeek logo in a gray background | InformationWeek

Mozilla has released Firefox 2.0.0.10, an update that address three security flaws.

The update issued Monday fixes a Java Archive handling vulnerability found in February that allows an attacker to hide exploit code in a Java Archive (.jar) file. It also fixes a memory corruption bug and a flaw that allowed an attacker to generate a fake HTTP Referer header for conducting a Cross-site Request Forgery (CSRF) attack.

Each of the three vulnerabilities is rated "high" by Mozilla, meaning the flaws could be used "to gather sensitive data from sites in other windows or inject data or code into those sites, requiring no more than normal browsing actions."

The Mozilla Community called for help testing the update last week and said improved code would be released this week. Firefox 3 Beta 1 was released last week as a developer preview.

Not fixed in Firefox 2.0.0.10 is a QuickTime flaw reported last week that affects both Mac and Windows users.

"An attacker can lure a victim to load a Web page with an embedded media object or a file in an e-mail, triggering a bounds checking error in QuickTime that may allow execution of arbitrary code," the Mozilla Security Blog explains. "This issue impacts QuickTime on Windows and on Mac OS and there is proof-of-concept code publicly available. If QuickTime is set as the default media player, Firefox will send the request directly to QuickTime. Mozilla is currently investigating this issue to identify ways to protect Firefox users."

In a report released today, the SANS Institute listed Web browser vulnerabilities among other top security issues in 2007. The SANS list cites 14 security vulnerabilities in Firefox in 2007 and 21 in Internet Explorer.

"The browser is really the main gateway today for malware," said Johannes Ullrich, CTO of the SANS Internet Storm Center, on a Tuesday morning conference call.

About the Author

Thomas Claburn

Editor at Large, Enterprise Mobility

Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful master's degree in film production. He wrote the original treatment for 3DO's Killing Time, a short story that appeared in On Spec, and the screenplay for an independent film called The Hanged Man, which he would later direct. He's the author of a science fiction novel, Reflecting Fires, and a sadly neglected blog, Lot 49. His iPhone game, Blocfall, is available through the iTunes App Store. His wife is a talented jazz singer; he does not sing, which is for the best.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights