Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Mozilla The Internet IT

Unpatched Firefox 1.5 Exploit Made Public 309

ThatGuyGreg writes "C|Net is reporting that an unpatched exploit in Firefox 1.5 has been made public, making it very easy for ne'er-do-well-sites to cause your browser to crash on startup with a single visit. Until a patch is released, it is recommended that you disable your history.dat file."
This discussion has been archived. No new comments can be posted.

Unpatched Firefox 1.5 Exploit Made Public

Comments Filter:
  • FC4, 1.5 (Score:4, Insightful)

    by (1+-sqrt(5))*(2**-1) ( 868173 ) <1.61803phi@gmail.com> on Thursday December 08, 2005 @06:27PM (#14214450) Homepage
    I can report that the exploit doesn't work on FC4, with the latest 1.5 built from source.
  • DOS (Score:5, Insightful)

    by kihjin ( 866070 ) on Thursday December 08, 2005 @06:31PM (#14214490)
    The 'exploit' seems only capable of a Denial of Service. There's no proof to indicate that malicious code could be executed.

    Plus, read this (from the article):

    "We have gotten no independent verification that it crashes (Firefox), but there have been a lot of attempts to try," Schroepfer said.

    So, this is all very hypothetical then?

  • Not an "exploit" (Score:4, Insightful)

    by joetainment ( 891917 ) on Thursday December 08, 2005 @06:32PM (#14214497)
    This isn't even related to security. Its just a bug.... lots of apps crash when something happens. Doesn't mean its ok, but it doesn't represent a security issue does it? (Unless I'm missing something...)
  • Really (Score:2, Insightful)

    by jupiter_ganymede ( 741242 ) on Thursday December 08, 2005 @06:32PM (#14214501)
    Is it just me or is this a pretty worthless report? I can't really see this as being an exploit anyone would care about unless you happen be work for a certain company in Redmond.
  • by brandonp ( 126 ) * <brandon.petersen@ g m a i l .com> on Thursday December 08, 2005 @06:35PM (#14214518) Homepage
    This will be a good test for the new Update System that was implemented in Firefox 1.5. Too bad it will need to be utilized so soon.

    With the speed that the Firefox developers release their fixes and the ease of getting those fixes with the new system, I hope this will develop as proof of how well Firefox can handle these situations.

    --
    Brandon Petersen
    http://www.brandonpetersen.com/ [brandonpetersen.com]
  • Re:Only crashes? (Score:4, Insightful)

    by courtarro ( 786894 ) on Thursday December 08, 2005 @06:35PM (#14214523) Homepage
    There are plenty of browser denial-of-service bugs, but few of them can actually render your browser useless upon every execution. This one has a lasting effect that's more significant that the old "do while(true) alert;"-style DoS attacks. A single double-click won't fix this one; you have to delete your old history.dat file.
  • Re:Only crashes? (Score:3, Insightful)

    by Anonymous Coward on Thursday December 08, 2005 @06:36PM (#14214528)
    If it causes a crash, it's entirely likely that some malicious code could be injected into memory when that happens! If so, you're potentially up shit creek.
  • by ninja_assault_kitten ( 883141 ) on Thursday December 08, 2005 @06:37PM (#14214534)
    The guy who reported it called it a 'buffer overflow' and clearly had no understanding of what it actually meant.

    which
    most users won't figure out.

    this proof of concept will only prevent someone from reopening
    their browser after being exploited. DoS if you will. however, code
    execution is possible with some modifcations.

    Tested with Firefox 1.5 on Windows XP SP2.

    ZIPLOCK

    -->

    heh
    function ex() {
                var buffer = "";
                  for (var i = 0; i ZIPLOCK says CLICK ME

  • by MushMouth ( 5650 ) on Thursday December 08, 2005 @06:37PM (#14214536) Homepage
    When an app crashes (firefox does quite often for me) it means that it is doing something that the programmer didn't expect. That could be all sorts of things, from taking all the cpu, to writing to memory that it shouldn't be. Most overflow exploits started as mere crashes.
  • Re:Only crashes? (Score:3, Insightful)

    by Jugalator ( 259273 ) on Thursday December 08, 2005 @06:38PM (#14214546) Journal
    Crashes may be signs of buffer overruns and access violations, which is a bad thing not only from the app's and user's perspective, but also from a security perspective, e.g. if the memory space was prepared earlier with malicious code.
  • Re:Only crashes? (Score:3, Insightful)

    by Thundersnatch ( 671481 ) on Thursday December 08, 2005 @06:47PM (#14214611) Journal
    The vulnerability is incorrect handling of input. In this case, the only *exploit* published so far is a DoS. But obviously there's something very wrong with the input validation in the code, and remote execution may be possible with a more clever exploit.

    Witness the recent IE vulnerability, which MS didn't patch quickly because it was "only a DoS vulnerability". Of course, it turned out it was possible to execute code with the vulnerability, it just took a while for a better (worse?) exploit to be crafted.
  • Stop the stupidity (Score:2, Insightful)

    by NineNine ( 235196 ) on Thursday December 08, 2005 @06:56PM (#14214678)
    Another tip for you: if you remove the gas pedal from your car, you won't have any crashes! Really!

    DOWNLOADING MORE SOFTWARE to intentionally disable part of a program that is supposed to work is 150% unacceptable.

    Jesus, how bad does software have to get before people finally start to not use it? Luckily, I didn't pay anything for my Firefox installations, so I can't really bitch. But I CAN look at other, less buggy alternatives (like IE) that also offer useful features that Firefox doesn't, like Active X.
  • Some exploit. (Score:3, Insightful)

    by bradbeattie ( 908320 ) <bradbeattie@alum ... a ['loo' in gap]> on Thursday December 08, 2005 @06:58PM (#14214695) Homepage Journal
    I recognize that it can cause inconvenience, but come on. Exploits in IE typically result in executing arbitrary code on the user's computer. I guess this is just another argument as to why system diversity is important. If no browser had more than 20% of the market it'd be difficult to target a large portion of internet users.
  • by Anonymous Coward on Thursday December 08, 2005 @07:06PM (#14214749)
    Even if most overflow exploits start as crashes, it doesn't mean most crashes are overflow exploits. Certainly worth investigating, but assuming that every crash is an exploitable vulnerability and publishing a news story based on that assumption is dumb.
  • by pclminion ( 145572 ) on Thursday December 08, 2005 @07:16PM (#14214827)
    Most overflow exploits started as mere crashes.

    While that is true, this could also be a simple null pointer dereference, caused by incomplete error handling in the code somewhere. Those sorts of failures are typically not exploitable.

    Just because A implies B, does not necessarily mean that B implies A. All overflows are crashable bugs, but not all crashable bugs are overflowable.

    It's easy enough to find out -- load the core file into gdb and look at the instruction that crashed. If it's a null reference, chances are this bug is no big deal.

  • Must be joking (Score:3, Insightful)

    by Charles Dodgeson ( 248492 ) <jeffrey@goldmark.org> on Thursday December 08, 2005 @07:18PM (#14214843) Homepage Journal
    The effect makes restarting Firefox very very slow (several minutes). I've just tested on OS X and on SuSE 9.3. Once that is done you can clear history through Prefences. If you don't want to wait, you can remove or manually edit history.dat.

    The claim of a buffer overflow is nonsense. I suspect that that claim is a joke. The only thing that makes this mild borking work is a very long document title. In setting that up, the author uses a variable called "buffer" and "buffer2". Just because a JS variable gets named "buffer2" and gets set to something very long doesn't make this a buffer overflow. I like to think that the guy must be joking, instead of actually being that stupid.

    But in the end, there is a bug to be fixed in Firefox

  • CORRECTION (Score:2, Insightful)

    by MooUK ( 905450 ) on Thursday December 08, 2005 @09:17PM (#14215634)
    Sorry, having just posted that, it THEN crashed when I closed the Apple tab.
  • by Kelson ( 129150 ) * on Thursday December 08, 2005 @09:37PM (#14215746) Homepage Journal
    Sure, the proof of concept uses JavaScript. But the problem itself has nothing to do with scripting. One could easily generate a 2.5MB HTML file with a really long title. 2 million "A"s in a row will probably compress pretty well, so if you serve it with on-the-fly compression, it doesn't have to take much extra time or bandwidth to retrieve.

    Bingo: exploited with no scripting involved at all.
  • Re:Only crashes? (Score:2, Insightful)

    by jonadab ( 583620 ) on Thursday December 08, 2005 @11:58PM (#14216447) Homepage Journal
    > Just because you can make a program crash, doesn't mean you can exploit it

    No, it doesn't mean that *necessarily*; however, there is historically a significant likelihood that such *might* be the case. The most recent IE remote arbitrary code execution exploit was formerly just a denial-of-service attack that for one reason or another never got patched, and eventually someone figured out how to make exploit it in a way that allows arbitrary code to be injected and executed. There are many other examples over time of cases wherein a flaw in some program or another, when initially discovered, was only a denial-of-service (or perhaps not even proven exploitable at all) but code injection and execution developed as a later, more sophisticated exploit of the same vulnerability.

    This should definitely get fixed, preferably *before* anybody discovers a way to do more malicious things than DOS with it. (And I have little doubt it will be fixed, probably quite soon, if past history is any indication of future performance.)

The optimum committee has no members. -- Norman Augustine

Working...