Unpatched Firefox 1.5 Exploit Made Public 309
ThatGuyGreg writes "C|Net is reporting that an unpatched exploit in Firefox 1.5 has been made public, making it very easy for ne'er-do-well-sites to cause your browser to crash on startup with a single visit. Until a patch is released, it is recommended that you disable your history.dat file."
FC4, 1.5 (Score:4, Insightful)
Re:FC4, 1.5 (Score:5, Informative)
Mozilla Foundation, which released Firefox, said it was not able to confirm the browser would crash or be at risk of a DOS attack, after visiting certain Web sites.
"We have gotten no independent verification that it crashes (Firefox), but there have been a lot of attempts to try," Schroepfer said.
Apparently they're having a hard time duplicating this particular bug. Has anyone here on
Re:FC4, 1.5 (Score:4, Interesting)
Re:FC4, 1.5 (Score:4, Informative)
As other have posted, it crashes IE as well. And every firefox crash I've had since I've installed 1.5 appears to have been QuickTime related!!!
All happening after installing 7 except for one.
Re:FC4, 1.5 (Score:2)
Posting from an "Exploited" FF 1.5 (Score:5, Informative)
False alarm. No security-related concerns, just overenthusiastic reporting.
If you run the script below, it will create a page with a title that's quite huge. Close your browser and open it again. The browser will spin for about 2 minutes what it tries to make sense the contents of your history file. Once it's finished, you'll be back up and running, with no degradation in performance or visible side-effects. You'll be able to even view your browsing history (including the offending page). In fact, I'm posting this response after following the process described above (on WinXP), and I have a history entry entitled "AAAAAAAAAAAAAAAAA..."
A bit of an annoyance, but hardly a security issue.
Here's the official exploit code:
Re:Posting from an "Exploited" FF 1.5 (Score:2)
Addendum:
As you might expect, if you delete the offending entry from your history, everything returns back to normal: you don't actually have to do anything drastic like delete your history.dat file, or even clear your browsing history.
Re:Posting from an "Exploited" FF 1.5 (Score:2)
Tools > Options > Privacy > Settings > Check Cache and Browsing History and Clear when closing firefox
Re:Posting from an "Exploited" FF 1.5 (Score:2)
function ex() {
var buffer = "A";
for (var i = 0; i 5000; i++) {
buffer += buffer;
}
document.title = buffer;
}
And that would truly be a pain in the ass.
But it occurs to me: would it be practical to add an option to Firefox which limits the physical size of your history file, which the user c
Re:Posting from an "Exploited" FF 1.5 (Score:2)
Re:Posting from an "Exploited" FF 1.5 (Score:2)
DDOS Attacks generally dont affect the security of a site, normally data is not compromised. Unfortunalty the site is unreachable at the time.
Re:Posting from an "Exploited" FF 1.5 (Score:3, Funny)
Re:FC4, 1.5 (Score:3)
Non-Story (Score:5, Informative)
"Correction: This story incorrectly stated the affiliation of Mike Schroepfer, Mozilla's results in verifying the Firefox 1.5 flaw, and the nature of the problem. Schroepfer is vice president of engineering with Mozilla Corp., and Mozilla has not been able to verify its browser can crash and lead to a denial-of-service condition. The problem itself was not a security vulnerability but actually a flaw in the browser."
So Firefox crashes, but no security vunerabilty.
Good Thing (Score:5, Funny)
Re:Good Thing (Score:5, Funny)
Re:Good Thing (Score:3, Funny)
Re:Good Thing (Score:3, Funny)
i feel so unsaf on teh intarweb!! (Score:2, Funny)
Rendered using Microsoft's *NEW* CSS/Teenager parsing utility:
The fix (Score:5, Informative)
Re:The fix (Score:3, Funny)
slashdot article title too terse (Score:2)
"Unpatched firefox 1.5 exploit made public recently by an unknown source who refused to name himself or other..." *crash*
Obligatory Jamaican Response (Score:5, Funny)
Re:Obligatory Jamaican Response (Score:5, Informative)
Re:Obligatory Jamaican Response (Score:4, Funny)
Digimon? (Score:2)
Is "Historymon" one of the new Digimon or something?
Informative :) (Score:2, Funny)
What? Oh, Jamaicans say "mon" instead of "man". I should write that important information down. Maybe it should be added to http://en.wikipedia.org/wiki/Jamaican_English [wikipedia.org].
Keep that information flowin', mon! Irie!
Shabba!
Re:Obligatory Jamaican Response (Score:2)
"Orange"
Jah forgive me for dis one.
Only crashes? (Score:5, Informative)
Re:Only crashes? (Score:4, Insightful)
Re:Only crashes? (Score:2)
Re:Only crashes? (Score:3, Insightful)
Re:Only crashes? (Score:2, Interesting)
Re:Only crashes? (Score:2)
Re:Only crashes? (Score:2)
Re:Only crashes? (Score:2)
Re:Only crashes? (Score:2)
A crash can often lead to an overflow exploit (Score:5, Insightful)
Re:A crash can often lead to an overflow exploit (Score:3, Insightful)
While that is true, this could also be a simple null pointer dereference, caused by incomplete error handling in the code somewhere. Those sorts of failures are typically not exploitable.
Just because A implies B, does not necessarily mean that B implies A. All overflows are crashable bugs, but not all crashable bugs are overflowable.
It's easy enough to find out -- load the core file into gdb and look at the instruction that crashed. If it's a null refere
Re:A crash can often lead to an overflow exploit (Score:2)
Re:A crash can often lead to an overflow exploit (Score:2)
Re:Only crashes? (Score:3, Insightful)
Re:Only crashes? (Score:3, Insightful)
Witness the recent IE vulnerability, which MS didn't patch quickly because it was "only a DoS vulnerability". Of course, it turned out it was possible to execute code with the vulnerability, it just took a while for a better (worse?) exploit to be crafted.
Re:Only crashes? (Score:2)
Incremental updates (Score:3, Informative)
Re:Incremental updates (Score:2)
If you leave Firefox open 24/7 does it ever check for updates automatically?
Stopping the stupidity (Score:5, Informative)
Cheers,
Toby Haynes
Re:Stopping the stupidity (Score:3, Informative)
Re:Stopping the stupidity (Score:5, Funny)
Stop the stupidity (Score:2, Insightful)
DOWNLOADING MORE SOFTWARE to intentionally disable part of a program that is supposed to work is 150% unacceptable.
Jesus, how bad does software have to get before people finally start to not use it? Luckily, I didn't pay anything for my Firefox installations, so I can't really bitch. But I CAN look at other, less buggy alternatives (like IE) that also offer useful features that Firefox doesn't, like Activ
Re:Stop the stupidity (Score:2)
I've always wondered why more browsers don't have JS enable/disable widgets by default. Konqueror has had this for eons and I love it dearly. My whitelist is small and is a trusted set of hosts. (now, the only problem with Konuqueror's JS implementation is that it fails on more sites than I'd like... Though 3.5 is supposed to be much better with JS.
Re:Stop the stupidity (Score:2)
Is that humor, or flamebait? It can be so difficult to tell...
how bad does software have to get before people finally start to not use it?
Yea, why DO people use JavaScript anyway ? But seriously, people are still using Windows, so... I guess the answer is "really, really bad".
;-)
Humor, people, humor!
Re:Stop the stupidity (Score:2)
Re:Stop the stupidity (Score:2)
Re:Stopping the stupidity (Score:2)
Today I browse with Safari on OSX, and I have javascript turned off by default. This is seldom problematic, since it's easy to turn javascript on for a moment once a week when it provides more than annoying eye candy.
Why focus on JavaScript? (Score:3, Insightful)
Bingo: exploited with no scripting involved at all.
Re:Stopping the stupidity (Score:2)
Re:Stopping the stupidity (Score:2)
The really, really nice feature of this tool is that when you go to enable javascript, you can see all of the several domains that are trying to run javascript on your machine, and only enable the one for the site itself. It's a very nifty tool. It even lets yo
DOS (Score:5, Insightful)
Plus, read this (from the article):
"We have gotten no independent verification that it crashes (Firefox), but there have been a lot of attempts to try," Schroepfer said.
So, this is all very hypothetical then?
ummmm (Score:3, Funny)
Not an "exploit" (Score:4, Insightful)
Re:Not an "exploit" (Score:2)
No, the browser does not crash. It just takes longer to start up because it has 10 megs of history to parse instead of a few K.
It really is no big deal.
Tin Hats Need Not Fear (Score:5, Funny)
Re:Tin Hats Need Not Fear (Score:2)
Re:Tin Hats Need Not Fear (Score:2)
Re:Tin Hats Need Not Fear (Score:3, Funny)
Those of us with wedding rings do that too.
Really (Score:2, Insightful)
Um... Did you RTFA? It's not an exploit (Score:5, Informative)
Quote from the bottom of the article:
Correction: This story incorrectly stated the affiliation of Mike Schroepfer, Mozilla's results in verifying the Firefox 1.5 flaw, and the nature of the problem. Schroepfer is vice president of engineering with Mozilla Corp., and Mozilla has not been able to verify its browser can crash and lead to a denial-of-service condition. The problem itself was a not security vulnerability but actually a flaw in the browser.
Read the article before you consider posting it with a sensational title!
IE's execution of arbitrary code (Score:5, Interesting)
No software is perfect, but still, Firefox is clearly ahead.
Re:IE's execution of arbitrary code (Score:2, Interesting)
Re:IE's execution of arbitrary code (Score:3, Informative)
It was fixed 24 hours after full disclosure, and only Win32 versions of Mozilla were vulnerable, doesn't this ring a bell?
Anyway, read this link [newsforge.com] for more info.
Re: (Score:2)
Good test for the new Update System (Score:3, Insightful)
With the speed that the Firefox developers release their fixes and the ease of getting those fixes with the new system, I hope this will develop as proof of how well Firefox can handle these situations.
--
Brandon Petersen
http://www.brandonpetersen.com/ [brandonpetersen.com]
Re:Good test for the new Update System (Score:2)
Yes, the British English version isn't available yet. Is this a clever ploy to get everyone using American English?
Re:Good test for the new Update System (Score:2)
It's completely retarded... (Score:3, Insightful)
which
most users won't figure out.
this proof of concept will only prevent someone from reopening
their browser after being exploited. DoS if you will. however, code
execution is possible with some modifcations.
Tested with Firefox 1.5 on Windows XP SP2.
ZIPLOCK
-->
heh
function ex() {
var buffer = "";
for (var i = 0; i ZIPLOCK says CLICK ME
Re:It's completely retarded... (Score:2)
I haven't looked at Mozilla's parser code, so it isn't clear exactly effect the buffer overflow will have. But it is a buffer overflow by definition.
Heh (Score:5, Funny)
Re:Heh (Score:2)
To clarify (Score:2)
Someone needed to create a scoop. (Score:4, Informative)
Wow, that is accurate reporting, which was then amplified in the summary to the point of absurdity.
Re:Someone needed to create a scoop. (Score:2)
C|Net, by their own admission, got almost every pertinent detail of the story wrong. The only way they could have have been further off target would be if they assigned the flaw to Internet Explorer. Personally, I'm not going to hold my breath waiting for that mistake to see print.
As a side note: I'm not normally one to slag off Slashdot's editors, but might I ask for a little more investigation before parrotting the lastest MS anti-Firefox propaganda? This is the third story this quarter por
1.0.7 Also vulnerable (Score:2, Interesting)
Older versions and Mozilla? (Score:2)
Firefox history code is horrible (Score:2, Informative)
Re:Firefox history code is horrible (Score:4, Interesting)
Once you have the idea on how sucky Mozilla's history stuff is in practice, take a look at how the stuff is actually stored in history.dat. People have been rendered insane by just a single look at that stuff. Want to make sense of this format for some obscure reason? Read this [livejournal.com] and weep [jwz.org]. This stuff is just about the most insane thing I've ever seen.
I sure hope Mozilla folks get the unified storage plans together for Firefox 2.0, and use something like sqlite to store most of the user data. MorkDB format used by Mozilla is... just not elegant.
so... (Score:5, Informative)
Patched. I use the history feature about twice a year, won't miss it till the right fix is found.
Not quite like disabling all the javascript in MSIE, is it?
thats the exploit? (Score:2)
Re:thats the exploit? (Score:2)
You're confusing the terms "exploit" and "vulnerability". All products have vulnerabilities. The ones that the vendor are aware of are called "known vulnerabilities". When code is written that takes advantage of a vulnerability, it's referred to as an exploit. When an exploit is written for a vulnerability that is not known by a vendor, that's called a Zero Day exploit. Some will argue that a Zero Day is when an exploit is written for a vulnerability that
Some exploit. (Score:3, Insightful)
Re:Some exploit. (Score:2)
And yea, I've never heard a DoS refered to as an exploit.
Must be joking (Score:3, Insightful)
The claim of a buffer overflow is nonsense. I suspect that that claim is a joke. The only thing that makes this mild borking work is a very long document title. In setting that up, the author uses a variable called "buffer" and "buffer2". Just because a JS variable gets named "buffer2" and gets set to something very long doesn't make this a buffer overflow. I like to think that the guy must be joking, instead of actually being that stupid.
But in the end, there is a bug to be fixed in Firefox
Re:Must be joking (Score:2)
Conversation with girlfriend/wife (Score:2)
doesn't crash FF 1.0.7 on Kubuntu Linux (Score:2)
Could Potentially Be Nasty With User Content (Score:2)
Re:From the better-than-the-alternative dept (Score:2)
Remember: If it segfaults your program, it might as well make it execute code!
Re:Is that a Product plug I see? (Score:3, Informative)
This bug is slightly lame, even as DOS -- There are no confirmed reports from half-or-more-brain-having people that it even crashes the browser in the first place. All it does is make the subseque
Re:Is that a Product plug I see? (Score:2)
Though not a security issue, a "DOS" that permanently crashes Firefox even when you run it again is pretty bad.
Re:lol no (Score:2)
Fixed that for ya
News.com.com story [com.com]