Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Mozilla The Internet IT

Unpatched Firefox 1.5 Exploit Made Public 309

ThatGuyGreg writes "C|Net is reporting that an unpatched exploit in Firefox 1.5 has been made public, making it very easy for ne'er-do-well-sites to cause your browser to crash on startup with a single visit. Until a patch is released, it is recommended that you disable your history.dat file."
This discussion has been archived. No new comments can be posted.

Unpatched Firefox 1.5 Exploit Made Public

Comments Filter:
  • The fix (Score:5, Informative)

    by rnelsonee ( 98732 ) on Thursday December 08, 2005 @06:29PM (#14214469)
    If it's already happened to you, just delete your history.dat file in your profile folder, and FireFox will create a new (empty) one on startup.
  • Only crashes? (Score:5, Informative)

    by ruiner13 ( 527499 ) on Thursday December 08, 2005 @06:30PM (#14214481) Homepage
    If this only crashes Firefox, how is it an "exploit"? I tend to use "exploit" as something that an attacker can use to their advantage to do something malicious. This is just an annoyance to have to move my poor cursor back to the icon and issue an oh-so-painful double-click.
  • Incremental updates (Score:3, Informative)

    by moonbender ( 547943 ) <moonbender AT gmail DOT com> on Thursday December 08, 2005 @06:31PM (#14214484)
    Sounds like a great opportunity to show off the snazzy automatic incremental update feature Firefox 1.5 has. Pushing a fix quickly to users who've got it enabled would be great.
  • by tjwhaynes ( 114792 ) on Thursday December 08, 2005 @06:31PM (#14214485)
    For anyone out there who wants a safer experience out on the web, you owe it to yourself to install the NoScript extension and only allow whitelisted sites to run Javascript. The exploit published this morning (more a DoS and only seems to affect some but not all installations of firefox 1.5 according to SANS [sans.org]) uses a Javascript loop to build up an enormous topic that ends up being written into your history.dat file causing buffer overflow issues. Without Javascript, this sort of exploit is much tougher.

    Cheers,
    Toby Haynes

  • by Schrade ( 902157 ) on Thursday December 08, 2005 @06:33PM (#14214508) Journal

    Quote from the bottom of the article:

    Correction: This story incorrectly stated the affiliation of Mike Schroepfer, Mozilla's results in verifying the Firefox 1.5 flaw, and the nature of the problem. Schroepfer is vice president of engineering with Mozilla Corp., and Mozilla has not been able to verify its browser can crash and lead to a denial-of-service condition. The problem itself was a not security vulnerability but actually a flaw in the browser.

    Read the article before you consider posting it with a sensational title!

  • by Godeke ( 32895 ) * on Thursday December 08, 2005 @06:38PM (#14214542)
    Correction: This story incorrectly stated the affiliation of Mike Schroepfer, Mozilla's results in verifying the Firefox 1.5 flaw, and the nature of the problem. Schroepfer is vice president of engineering with Mozilla Corp., and Mozilla has not been able to verify its browser can crash and lead to a denial-of-service condition. The problem itself was a not security vulnerability but actually a flaw in the browser.


    Wow, that is accurate reporting, which was then amplified in the summary to the point of absurdity.
  • Re:FC4, 1.5 (Score:5, Informative)

    by Anonymous Coward on Thursday December 08, 2005 @06:40PM (#14214565)
    The Mozilla people are also reporting that the exploit doesn't seem to work on any version of 1.5:

    Mozilla Foundation, which released Firefox, said it was not able to confirm the browser would crash or be at risk of a DOS attack, after visiting certain Web sites.

    "We have gotten no independent verification that it crashes (Firefox), but there have been a lot of attempts to try," Schroepfer said.

    Apparently they're having a hard time duplicating this particular bug. Has anyone here on /. seen it actually happen?
  • by uberjoe ( 726765 ) on Thursday December 08, 2005 @06:44PM (#14214582)
    You mean: "Dat file will be history Mon.
  • by Anonymous Coward on Thursday December 08, 2005 @06:47PM (#14214620)
    In other news: Water is wet. Seriously, whoever wrote the history code needs to be shot. Once your history gets to any significant size, all operations on it start getting annoyingly slow. For me, it takes 15 seconds for firefox to open the Go menu for the first time in a session, and once you've done that, even more annoyingly there's a delay of a few seconds on every new page you visit for the rest of that session. The history sidebar is so excruciatingly slow it's practically unusable.
  • so... (Score:5, Informative)

    by SharpFang ( 651121 ) on Thursday December 08, 2005 @06:48PM (#14214623) Homepage Journal
    Preferences > privacy > history > [0] days; ok.
    Patched. I use the history feature about twice a year, won't miss it till the right fix is found.
    Not quite like disabling all the javascript in MSIE, is it?
  • by Psykus ( 827143 ) on Thursday December 08, 2005 @06:52PM (#14214658)
    The NoScript extension [mozilla.org] itself.
  • by Anonymous Coward on Thursday December 08, 2005 @06:58PM (#14214693)
    No, just a badly worded summary of the original storm center diary entry [sans.org] in which the ISC handler attributes the possible FAILURE of this bug to crash firefox to the McAfee software, which, in his mind, has some mystical power to optimise firefox's inefficient string parsing algorithm even when it's deactivated!

    This bug is slightly lame, even as DOS -- There are no confirmed reports from half-or-more-brain-having people that it even crashes the browser in the first place. All it does is make the subsequent startups slow, especially noticable in slower machines.

    See bug 319004 at bugzilla.mozilla.org.
  • by tyler_larson ( 558763 ) on Thursday December 08, 2005 @07:08PM (#14214766) Homepage

    False alarm. No security-related concerns, just overenthusiastic reporting.

    If you run the script below, it will create a page with a title that's quite huge. Close your browser and open it again. The browser will spin for about 2 minutes what it tries to make sense the contents of your history file. Once it's finished, you'll be back up and running, with no degradation in performance or visible side-effects. You'll be able to even view your browsing history (including the offending page). In fact, I'm posting this response after following the process described above (on WinXP), and I have a history entry entitled "AAAAAAAAAAAAAAAAA..."

    A bit of an annoyance, but hardly a security issue.

    Here's the official exploit code:

    function ex() {
    var buffer = "";
    for (var i = 0; i < 5000; i++) {
    buffer += "A";
    }
    var buffer2 = buffer;
    for (i = 0; i < 500; i++) {
    buffer2 += buffer;
    }
    document.title = buffer2;
    }
  • Non-Story (Score:5, Informative)

    by Midnight Thunder ( 17205 ) on Thursday December 08, 2005 @07:14PM (#14214807) Homepage Journal
    C|Net has added the following correction at the end of the story:

    "Correction: This story incorrectly stated the affiliation of Mike Schroepfer, Mozilla's results in verifying the Firefox 1.5 flaw, and the nature of the problem. Schroepfer is vice president of engineering with Mozilla Corp., and Mozilla has not been able to verify its browser can crash and lead to a denial-of-service condition. The problem itself was not a security vulnerability but actually a flaw in the browser."

    So Firefox crashes, but no security vunerabilty.
  • Re:FC4, 1.5 (Score:4, Informative)

    by mebob ( 57853 ) on Thursday December 08, 2005 @08:49PM (#14215463)
    I'm pretty sure that it is the new QuickTime 7 plugin causing that.
    As other have posted, it crashes IE as well. And every firefox crash I've had since I've installed 1.5 appears to have been QuickTime related!!!
    All happening after installing 7 except for one.
  • by Dreadlord ( 671979 ) on Friday December 09, 2005 @04:33AM (#14217518) Journal
    The origin of the bug is Windows and its shell: protocol, Mozilla simply handled those links back to the OS ad it does with protocols it doesn't know how to handle, other programs like MS Word were vulnerable to the very same exploit.

    It was fixed 24 hours after full disclosure, and only Win32 versions of Mozilla were vulnerable, doesn't this ring a bell?

    Anyway, read this link [newsforge.com] for more info.

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...