Browser Vulnerability Study Unkind to Firefox 253
Browser Buddy writes "A new Symantec study on browser vulnerabilities covering the first half of 2006 has some surprising conclusions. It turns out that Firefox leads the pack with 47 vulnerabilities, compared to 38 for Internet Explorer. From Ars Technica's coverage: 'In addition to leading the pack in sheer number of vulnerabilities, Firefox also showed the greatest increase in number, as the popular open-source browser had only logged 17 during the previous reporting period. IE saw an increase of just over 50 percent, from 25; Safari doubled its previous six; and Opera was the only one of the four browsers monitored that actually saw a decrease in vulnerabilities, from nine to seven.' Firefox still leads the pack when it comes to patching though, with only a one-day window of vulnerability."
Truth to the market segment argument? (Score:3, Funny)
-Rick
Re:Truth to the market segment argument? (Score:5, Insightful)
Re:Truth to the market segment argument? (Score:5, Informative)
Re: (Score:3, Insightful)
somebody did... [g2zero.com] recently... like just a very short while ago...
Re: (Score:3, Informative)
Re: (Score:2)
Having said that, I don't see how my machine can be trojaned. This is knoppix, after all. I do have Firefox protected somewhat with th
Re: (Score:2)
Re: (Score:3, Insightful)
There seems to be a journalistic approach that equates more patches with less security.. More patches means a -more- secure product, not a less secure product. We're not talking about Windows XP here, where the tide of patches has never stemmed, to the point where their patches have been guilty of creating new security vulnerabilities
Re: (Score:3, Insightful)
More vulnerabilities is bad, but more reported vulnerabilities is not. More reported vulnerabilities is good as long as the vulnerabilities are being patched. I would be happy to hear that they ironed out a thousand vulnerabilities in FireFox this month.
No software is without vulnerabilities, but the more vigorously they are hunted out and patched the more obscure the ones left will be. If a thousand vulnerabilities are found and fixed in FireFox this month they will prob
How about measuring days of vulnerability (Score:3, Insightful)
Re: (Score:3, Insightful)
Re: (Score:3, Informative)
I use Firefox for my general browsing, and am now using linux as my main OS. My wife/kid's pc's are setup as above..
Re: (Score:2)
Re: (Score:2)
You might try installing an extension on Firefox portable [portableapps.com] and giving them that in a self extractor that includes a shortcut to Firefox on the All Users desktop... or something... Man, it's so long since I've done this Windows stuff I'm not even sure what's feasible any more :)
Re: (Score:3, Informative)
I don't know whether it's a feature of Firefox itself, or an extension called MR Tech's Local Install, but if you place downloaded extensions in the Extensions folder, Firefox will prompt you to install them next time it's run.
FWIW, it would be nice to be able to slipstream extension installs into Firefox installs; you could make a tightened security... heh... distribution of Firefox with AdBlock, NoScript and so on included; a neat, quick install for people who have to do it a lot.
Then again, it doesn't
Re: (Score:2)
Look at the uptick in reported vulnerabilities (Score:2)
Agreed, pretty meaningless without specifying the severity of the vulnerabilities and the time to get them patched.
Plus, to a pragmatic user, does it really matter why there are so few exploits in the wild? "Inherent" security won't pay for a format and reinstall. If you can browse safely, the only reason to pay attention to the "It's not popular enough to exploit" arguments is to stay alert as your br
JC, mobs and mods (Score:5, Insightful)
That said, I use FF. I think it is a superior product when compared to IE. And FF developers' ability to address and rectify those vulnerabilities has been proven time after time to be better than MS's ability.
So, the whole point I was hoping to provoke in conversation:
Vulnerabilities Discovered != Vulnerabilities
Increased Usage = Increased Vulnerabilities Discovered
-Rick
Re: (Score:3, Funny)
Re: (Score:2)
-Rick
Re: (Score:2)
But come on, the study is obviously going after the huge market share of windows machines that run either IE or Firefox. If Kubuntu was as prevalent as Windoze then yes you would see a lot more hackers working on breaking them, it's a game of numbers; it doesn't help that for most novices windows is the first OS they get to use (and struggle with).
Then again, Symantec has always been in bed with IE and for them to claim that Firefox is insecure onl
Not so bleak (Score:5, Informative)
If we look to Secunia, we see that IE has 106 advisories, 19 of which are unpatched. [secunia.com] Firefox has 3 of 36 unpatched [secunia.com]. The most sever unpatched advisory in IE is rated as "extremely critical." In Firefox, as "less critical."
Opera wins :-) (Score:2, Insightful)
Have a look at Opera 9.x's advisory list [secunia.com] :-)
Qt? (Score:2)
An advantage for Opera: timing (Score:2)
This probably means that most vulnerabilities in Opera are found internally, or reported straight to Opera by researchers. At that point Opera works on a bug fix, then releases the update and the advisory together.
By contrast, many vulnerabilities for Microsoft and Mozilla products get posted to Bugtraq or otherwise
Re: (Score:2)
Yup - I had the very same discussion [opera.com]with Opera devs about my bank's web site. I bank with one of the largest banks in Canada, and Opera devs claim the problem is with the authors of the banking site, not with Opera itself.
While I am a fan of Opera, why would any bank give a flying fart if their site doesn't work with Opera? I tried to convince the Opera devs it was a problem with their browser, and they ci
Re: (Score:3, Informative)
Re: (Score:2, Insightful)
What they are saying, in my interpretation, is that allowing a subdomain to redirect from a domain is actually an insecure thing to do, as it is not simple for the browser to determine whether a domain is actually a subdomain (i.e. example.co.uk example2.co.uk aren't both subdomains of co.uk for this purpose).
They then give a piece of javascript that
Re: (Score:2)
Re: (Score:2)
Opera and bug reports (Score:2)
The way to deal with that, I've found, is to ask follow-up questions on the forums [opera.com]. If you keep track of the bug report numbers, it's even better.
I reported a couple of CSS bugs back during the betas for Opera 8. Nothing happened. So during the Opera 9 betas, I posted questions about them, asked about other bugs I encountered, and funny thing, every la
Re: (Score:2)
Affected By 1 Secunia advisories, Unpatched 0% (0 of 1 Secunia advisories)
Article hurts my brain (Score:2)
Re: (Score:2, Informative)
Re: (Score:2)
What do the numbers even mean? (Score:5, Interesting)
I can't really say, but to me it looks like exactly what I would expect from an open source system: More publicly known bugs (not necessarily more or less actual bugs), and a faster turnaround time on bugs.
Re:What do the numbers even mean? (Score:5, Insightful)
(Here what I was about to post, but you pretty much summed up my viewpoint. Before all, here is a direct link to this Symantec Internet Security Threat Report -- Volume X: September 2006 [veritas.com] that is talked about.)
Totally. Pointless. Comparison.
First, as the Slashdot posting correctly points out, the window of vulnerability is much larger with IE. Microsoft is known for taking months to fix some vulns, and is taking longer and longer [washingtonpost.com] over the years.
Second, what about the importance of these vulns ? Was it 47 minor DoS for Firefox and 38 critical arbitrary code execution vulns for IE ?
Third, what about the methodology used to gather the vuln counts ? The report always says "Source: Symantec Corporation", with no more information. Did they count Firefox security related bugs or security advisories ? Did they count 1 Microsoft patch fixing N vulns as 1 or N vulns (too many studies make this mistake) ?
Fourth, what about silently fixed vulns in IE ? Microsoft is known for secretly fixing vulns that are discovered internally [eweek.com], and of course they never talk about them in public. Symantec certainly did not count these.
There are just too many reasons making virtually all studies comparing the number of security patches between 2 products useless. This one is no exception.
Re: (Score:3, Interesting)
I think it'd be more correct to say it's an unfair and biased comparison than a pointless one. I know I'm being cynical, but the comparison is completely logical from a Symantec marketing perspective. (Well, that's what FUD is realistically.)
In particular, Firefox is a web browser that doesn't have a reputation of needing external software to protect it. If more people use Firefox, it also increases the motivation for website developers to develop compatible websites, an
Re: (Score:3, Interesting)
Re: (Score:3, Informative)
This is only theoretically possible and then really only in circumstances where the virus or trojan is not an OS specific binary but a script of some sort. It is virtually impossible to have a cross platform OS binary work on more than one OS. For this to work, the exploit would need to leverage similar flaws in both OS binary loaders such as the Windows PXE loader and the
Not so hard... (Score:2)
And it's not like this is a new idea, the original Morris Worm [wikipedia.org] was cross-platform. (Solaris and BSD on DEC. hardware). That one had to actually make several network connections to a system, trying a different payload each time.
But a web browser, it will make multiple connections for you, and download multiple attack payloads for you. Isn't that convenient?
Consider this... (Score:4, Insightful)
IE 5/6 have been stagnant for years. Of course the number of bugs isn't going to be as large.
That said, I know which one will issue a bug fix more quickly when something IS found...
And consider this, too... (Score:5, Insightful)
Consider this, too:
This report is put out by a company that makes its living by protecting users from software like Internet Explorer. If people stopped using Internet Explorer, how would it make its money? (Okay, that's a little tinfoil-hatish.)
But also consider this:
Those are vulnerabilities that we know of. They're pretty easy to find (oh, and fix) when people can pore over your source code. How many vulnerabilities are in Internet Explorer/Opera/Safari that we don't know of, that aren't getting fixed, and just waiting for someone to figure out to blow up?
That's when you're really thankful of this:
Re:And consider this, too... (Score:4, Informative)
Webkit is to Safari what Gecko is to Firefox and what KHTML is to Konqueror.
Re:Consider this... (Score:5, Informative)
Opera keeps having new features added too, though. Despite this, according to the article, Opera managed to have a decrease in vulnerabilities - so why not Firefox?
Re: (Score:2, Interesting)
User base and source control (Score:5, Insightful)
Opera has a low user base and is closed source. Therefore, few vulnurabilities. In short, no one cares.
Firefox, on the other hand, has a moderate user base but the source code is right there, the vulnurabilities are ripe for the picking. Hence why the vulnurabilities are high but the turnaround time to fix them, also quick.
IE on the other hand, high user base closed source. High vulnurabilities because of the high user base but potential hackers have to work harder.
Really, this study is a no-brainer. The results make perfect sense.
Delicious irony! (Score:2)
Does anyone else appreciate the irony inherent in the fact that some Firefox users claim that Opera only appears more secure because fewer people use it, and therefore fewer users encounter problems and fewer attackers look for them?
It wasn't that long ago that IE users were making the same claim about Firefox. I seem to recall the argument wasn't terribly popular among this crowd.
Re: (Score:2)
Re: (Score:2, Funny)
So, in other words, the Mozilla project has become Microsoft, but more so?
Increase in user base? (Score:2, Insightful)
Best part, no rebooting for patching... (Score:5, Insightful)
For most of the IE vulnerabilities, I have to reboot my computer to install it.
Firefox is nice enough to download it and install it the next time I start the browser.
And it does it more than the 2nd Tuesday of each month.
Re: (Score:2, Insightful)
It's very very hard to turn off too!
Your choice is between having a secure, patched browser and a slow internet connection for the however many minutes it takes to download the patch; or to have an unpatched, unsecure browser and all access to all the bandwidth. The one
Re: (Score:2)
Version? (Score:5, Interesting)
Re: (Score:2)
So what? (Score:5, Informative)
This study shows me nothing useful. Given the fact that all software is buggy, there are many more people looking at the source for Firefox than for IE, so it's inevitable more issues will be found. The more that are found the more that can be fixed before they're a problem.
IE has improved over the years, and will improve further with v7. Doubtless Firefox's progress is at least partially driving that. But the noddy users (hi Dad!) that I've given Firefox or Opera to have had far fewer malware problems than those who insist on sticking with IE.
Re: (Score:2, Insightful)
> the wild? How many of them have caused users to lose data or unintentionally host malware? How many have resulted
> in people's identities being stolen?
The issue is that Firefox (and Thunderbird) has had many security issues, and still has many. For instance,
KDE Konquerer WWW browser has not has nearly as many security issues.
> his study shows me nothing useful. Given the fact that a
Re: (Score:2)
Comparing the "number of vulnerabilities" is irrelevant to me. How many of them have actually been exploited in the wild? How many of them have caused users to lose data or unintentionally host malware? How many have resulted in people's identities being stolen?
The study does not give exact numbers for any of these things, but it does nicely summarize the state of these things by saying all the widespread exploits were for IE and none for any other browser.
This study shows me nothing useful.
The study
How Vulnerable Vs. How Dangerous (Score:5, Insightful)
The more ubiquitous an application, the more it will be examined as a possible attack vector, and the more it will be exploited as an attack vector.
IE is still far more dangerous to use than Firefox thanks to the fact it is still used by far more people.
Re: (Score:2)
Switch back to IE, you're blocking the view from my Ivory Tower.
Re: (Score:2)
The more ubiquitous an application, the more it will be examined as a possible attack vector, and the more it will be exploited as an attack vector.
IE is still far more dangerous to use than Firefox thanks to the fact it is still used by far more people.
So if we all want to remain safer, we should all go to Firefox..
In which case Firefox becomes the top browser, and IE will become less dangerous... You can't win, ca
Belt and suspenders (Score:2, Informative)
Re: (Score:2)
vulnerabilities threat level is key (Score:5, Insightful)
Wrong Numbers (Score:5, Insightful)
It turns out that Firefox leads the pack with 47 vulnerabilities, compared to 38 for Internet Explorer.
This is very misleading. These are the numbers of vulnerabilities reported to Symantec and which the vendor has acknowledged to Symantec. The total number of vulnerabilities reported to Symantec are 50 for Firefox and 57 for IE.
If you add to this the quote from Symantec, "at the time of writing, no widespread exploitation of any browser except Microsoft Internet Explorer has occurred..." you start to see that this is mostly spin with little substance. Firefox is not really being attacked, and while they have bugs they fix them an order of magnitude faster and have an open process that responds to the community. This bug count includes all the bugs the Firefox team found, but who knows what percentage of bugs Microsoft and partners found that they deemed not worth fixing and which do not show up in this study? It is debatable that in theory, Firefox is more secure, but attempts like this to twist numbers to make is seem like maybe Firefox is not more secure in practice, are misleading and simply a way to get attention. I declare the summary here to be FUD.
Re: (Score:2, Insightful)
. .
KFG
FUD (Score:4, Insightful)
Comparing Dogs and Foxes. (Score:5, Insightful)
And dont just count the "vulnerabilities". Give some weightages. One "not critical" vulnerability in Firefox IS NOT EQUAL to one critical vulnerability in IE. Like "Not Critical" has a weight of 1, and scale it by a factor of 10 for each higher level. Then do a weighted sum.
MOD PARENT UP! (Score:2)
malicious code on it.
It'd be like grouping all crimes together between two cities. City A might have 150 incidents of shoplifting, but only 10 murders. City B might only have 100 incidents
Re: (Score:2)
Doesn't bugzilla conceal security-related vulnerabilities?
Re: (Score:3, Informative)
Yes, but only until a fix is delivered to most users (automatic downloads, linux distros update their repositories). After that, the bugzilla entry is publicly accessible for all to see, including the original reporting date, the discussion of the problem and who reviewed the fix. This is similar to the handling for most security vulnerabilities which are dealt with privately with the original developers until either the reporter gets fed up with w
The difference is... (Score:2, Insightful)
Re: (Score:2)
This is terrible! Now it has more bugs than IE, is less secure than IE! What next? They'll be telling me it is saturating my ISPs bandwidth causing them to throttle my connection, and downloading bittorrents bringing about the end of the Internet as we know it! Stop using Firefox everybody.
(sheesh!)
Don't care (Score:4, Insightful)
Firefox: Rarely targetted, even for severy evulnerabilities. Nearly always fixed in a couple days, tops. Patched as soon as fix becomes available.
IE: Always targetted, with rapid response from a variety of nefarious 'net villains. Patch released the second Tuesday of the month, unless that happens to be less than 2wks away, in which case it stands a fair chance of being the second Tuesday of next month. If no exploits gain significant media coverage, it may be over a half year. Patch is optionally downloaded / installed as soon as it becomes available, but to enable this you must also enable automatic patching of the OS, office suite, and possibly even some 3rd party software, which needless to say is a dangerous thing to do institution-wide.
ActiveX (Score:5, Interesting)
Firefox may have more vulnerabilities, but none of them are as dangerous as the ActiveX server in IE. The numeric comparision in TFA is not even half the truth.
M$ won't patch a vulnerability IE overnight - but look how fast they patched a hack to their WMP DRM.
Symantec Motive (Score:5, Insightful)
More risk and more problems means Symantec has an easier time selling its services.
I predict an even greater number next time. (Score:3, Informative)
Salting the mine (Score:3, Interesting)
Symantec is doing much the same thing, for the same purpose, which is to encourage Linux/FireFox/FOSS users to buy their worthless anti-virus software.
The "study" they cite conveniently forgets that the ONLY security holes that IE users KNOW about are the ones that MICROSOFT TELLS THEM ABOUT. History has taught us that many holes were known by Micosoft for months, and in some situations years, before they were publically revealed, and many times NOT by Microsoft! The other thing that IE users DON'T KNOW is HOW LONG they have been vulnerable to those holes that Microsoft announces a patch for. FOSS applications, on the other hand, encourage PUBLIC annoucements of any security discoveries, along with any proof of concept code that can be used to test the patch. Those that use FOSS applications can then take timely and appropriate measures to protect their PCs and their data until the patch is released, which is usually within a day or two. Windows users hang, twising in the winds of vulnerability for months at a time or longer. In fact, some security holes are never patched and Microsoft serves its own bottom line by telling victims of their software to "upgrade", as if that would protect them. P.T. Barnum was right, you CAN fool some of the people ALL of the time.
it's better to have a virus than symantec on a pc (Score:2, Informative)
Security Comparisons are Impossible (Score:2)
How many people were trying to find bugs in each product? How do the skills of the people looking for holes in one product compare to the skills of the people finding holes in the other products? Wh
Just a quick question... (Score:2, Interesting)
Not that I'm bashing FireFox at all, I love it, but I wonder how many exploitations lie within the extensions?
But... (Score:2)
Firefox leads the number of KNOWN vulnerabilities (Score:2)
both good and bad (Score:3, Insightful)
Now, it can be implied that it indicates poor software development and overall poor software quality coming out of the Mozilla Foundation. But I think this would simply be conjecture. While it is certainly statistically true, there's a larger picture to look at.
Internet Explorer has been mostly static now for years; it hasn't seen any major development until recently (and that software isn't even what's being looked at here). Firefox, on the other hand, has been improving - adding new features, fixing complaints, and generally trying to come up with a better product. This is going to result in a higher number of security-problematic pieces of code - face it, people aren't perfect, and the only way to mitigate (not eliminate!) this realistically is to slow development to a standstill. Even then there would not be a guaranteed reduction in vulnerabilities, partially due to chance and oversight, and partially due to the large repository of existing code which it would have to interact with.
Furthermore, Firefox and Mozilla are just edging into the public consciousness, whereas Internet Explorer has had a technological hedgemony on the desktop as the browser now for almost a decade (in various versions). This means it's going to start receiving more scrutiny, both from malicious, malevolent folks, as well as from the benevolent security professionals. A higher detection rate is a natural result of this.
It's a double-edged sword. More detections are being made, resulting in more vulnerable systems. This is a natural state in computing, as computing innately involves security these days. There will always be risk involved. The significant thing to look at is how quickly these problems are being resolved, and how many how resurgent problems (ie, they weren't properly resolved). I would argue that the presented statistical information is irrelevant without further, more indepth analysis in this regard.
Number of critical vulnerabilities (Score:2)
This means that IE has more than twice the number of vulnerabilities leading to a complete system compromise than Firefox.
More info here:
http://secunia.com/product/11/?task=statistics_200 6 [secunia.com]
Read the report yourself (Score:3, Informative)
It never fails to amaze me that slashdotters tend to post news stories rather than the source.
They're not comparing apples to apples (Score:3)
Unless Microsoft sees that someone else knows the bug, they won't release a patch. They will fix it in the source tree for the next major release, but they will not release a patch for the current version. They do this because when they release a patch, security researchers, both good and bad, will do a "BinDiff" and find out what exploit they've fixed. Bad people will then use that bug on unpatched users. If a bug isn't externally rediscovered before the release of the next major version, it's kept secret forever. You can't bindiff major releases, because there's too many changes.
Firefox, in contrast, will generally release a patch for the current version, even if only the Firefox security team knew about it.
Under these circumstances, of course Firefox will have more listed exploits.
Melissa
IE, how about all those unpatched holes? (Score:2)
All MS
Re: (Score:2)
As much as I like Safari, the a zero day exposure just means they got the reports earlier. As much luck as anything else, really.
Re: (Score:2, Insightful)
Newsflash: Bloated applications with developers more interested in adding features than fixing bugs are more easily exploitable.
Re: (Score:3, Informative)
From The Ars Technica article:
It seems like Mozilla developers are quite interested and skilled in fixing bugs to
Re: (Score:2)
1
Re: (Score:2)
Oh, no, the "security through obscurity" argument again on *nix and Windows. May I ask what OS you think is most popular for servers? What OS was the internet built on? By your logic, there would be as many viruses attacking *nix-type OSes because most servers are running thoses OSes. But there's not. If you were right, sites would be going down all the time, since *nix is supposed to be as vulnerable to malware as Windows. Imagine Google going down at least once a week! Or Slashdot, for that matter. But th
Re: (Score:2)
This is like Linux vs. Windows. Open Sorce[sic] vs closed sorce[sic].
Not really. This is a study of the state of the industry across a variety of open, closed and mixed open and closed source development processes. It is a bit disorganized, but it shows number of publicly known bugs and bugs speed of fixing bugs once they are public. We can speculate as to how much the popularity of a browser contributes to said, number of bugs, but the speed to fix is a lot more interesting, especially in this case.
Pe
Re: (Score:2)
Yeah...find me support for all that hardware.
Umm, we sell servers on 8 different server platforms and have never had a problem with Linux supporting it. Nor have we had any problem with the Thinkpads, powerbooks, and towers we buy. Obviously you've never tried using Linux in a business environment.
I take it you mean you admit your sig is wrong, in that you can't find me a way MS does what I need 20 times better. Gee, what a surprise.
Also show me what Linux can do over Sharepoint, CRM, Portal server, G
Re: (Score:3, Interesting)
Re: (Score:2, Insightful)
You're kidding, right? IE = Firefox?
Not-Microsoft doesn't make software secure.
No, non-one patch day a month makes it secure.
Only competent programmers and a ruthless ability to say 'no' to new features will even begin to make Firefox secure.
I've never had Firefox crap out on me like IE.
There's nothing that indicates the pool of programmers who contribute to firefox is any better than any other group of programmers.
No, but ther
Re: (Score:2)
Yummy (Score:2)
Mmmmmm, fudge...