Mozilla Issues Firefox 2.0.0.12 Security Update

The update addresses 10 security advisories, three of which Mozilla classifies as critical.

Thomas Claburn, Editor at Large, Enterprise Mobility

February 8, 2008

2 Min Read
InformationWeek logo in a gray background | InformationWeek

Mozilla on Friday released Firefox 2.0.0.12, an updated version of the upstart browser that has won over roughly one out of every five Internet users worldwide.

The 2.0.0.12 update addresses 10 security advisories, three of which Mozilla classifies as critical.

One of the critical advisories has to do with the way that images are handled on Web pages with designMode frames, an HTML property that allows Web documents to be edited. The vulnerability could potentially be exploited to steal a user's browsing history, crash Firefox, or execute arbitrary code. The second critical advisory has to do with memory corruption crashes in the browser engine used by Firefox and other Mozilla products like Thunderbird. The third outlines a flaw that could allow JavaScript privilege escalation and the ability to execute arbitrary remote code.

In its 2007 security report, Secunia analyzed a limited set of vulnerabilities that were disclosed publicly, before vendor notification, and found that Mozilla on average patched Firefox flaws more quickly than Microsoft patched holes in Internet Explorer.

Secunia's report also notes that Internet Explorer had fewer vulnerabilities than Firefox in 2007 (43 compared to 64). In December, Jeff Jones, security strategy director in Microsoft's Trustworthy Computing group, presented similar statistics to support his claim that Internet Explorer was more secure than Firefox.

Mike Schroepfer, Mozilla's VP of engineering, in a blog post dismissed the idea that vulnerability counts matter. Citing the absence of a public IE bug database, he said, "There is no way for anyone outside of Microsoft to confirm how many vulnerabilities ever existed in Internet Explorer."

One area where Firefox appears to best Internet Explorer is in the number of vulnerabilities reported in browser add-ons. There were six vulnerabilities reported in Firefox extensions and 339 vulnerabilities in ActiveX controls in 2007, according to Secunia. It should be noted, however, that browser add-ons are generally developed by third-party programmers, who are ultimately responsible for writing safe code.

Microsoft has been working to help developers write safer ActiveX controls, though in light of the large number of vulnerabilities cited by Secunia, its efforts leave something to be desired.

"If an independent software vendor discovers that they have shipped a vulnerable control, they can work with Microsoft to issue an update that disables that control," a Microsoft official said in an e-mail on Thursday. "Up until this time, [email protected] has not been contacted directly by any company regarding the recent public reports of vulnerabilities in ActiveX controls."

About the Author

Thomas Claburn

Editor at Large, Enterprise Mobility

Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful master's degree in film production. He wrote the original treatment for 3DO's Killing Time, a short story that appeared in On Spec, and the screenplay for an independent film called The Hanged Man, which he would later direct. He's the author of a science fiction novel, Reflecting Fires, and a sadly neglected blog, Lot 49. His iPhone game, Blocfall, is available through the iTunes App Store. His wife is a talented jazz singer; he does not sing, which is for the best.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights