Results 1 to 2 of 2

Thread: OPPS! We made a mistake...no security flaw in Firefox 1.5

  1. #1
    Senior Member
    Join Date
    Dec 2004
    Posts
    3,171

    OPPS! We made a mistake...no security flaw in Firefox 1.5

    Correction: Unpatched Firefox 1.5 exploit made public
    This story incorrectly stated the affiliation of Mike Schroepfer, Mozilla's results in verifying the Firefox 1.5 flaw, and the nature of the problem. Schroepfer is vice president of engineering with Mozilla Corp., and Mozilla has not been able to verify its browser can crash and lead to a denial-of- service condition. The problem itself was a not security vulnerability but actually a flaw in the browser.

    Read the updated story here
    http://news.com.com/2303-10915_3-598...7864&subj=news
    Correction: Unpatched Firefox 1.5 exploit made public | CNET News.com

    Apparently it was a flaw in the design and not a security risk or vunerability...well...that's good news....I think?!
    Kinda like saying...' well the good news is no one will break this baby, the bad news is no one has to, it'll break all on it's own '

    As a follow-up tp SANS own warning:

    UPDATES:

    The machine I was testing this on has McAfee Enterprise 8, and Firefox would not crash. Despite my valiant efforts in disabling the protection, I couldn't get it to crash. While annoyed that I couldn't (short of uninstalling) get the protection disabled, it probablly is a good thing. I'll test more when I get in the office tomorrow and have more machines to play with.

    This seems to be more of a denial of service than a true buffer overflow. It looks like Firefox just chokes on page topics that are too long. Some people it hangs, other people it crashes.

    WORKAROUNDS:

    However, the following is a workaround that should work (if it doesn't let me know). Go to Tools -> Options.

    Select the Privacy Icon, and then the History tab. Set the number of days to save pages at 0. This will disable writing anything to history.dat as far as I can tell, and should nullify the exploit. Readers have confirmed that this workaround does prevent the buffer overflow. You can also change your privacy settings to delete personal info when you close Firefox.

    Another workaround is to modify prefs.js while Firefox has not been started and put in the line:

    user_pref("capability.policy.default.HTMLDocument.title.set","noAccess");

    Lastly, you can also run the NoScript extension, found here. (Which I have not looked at in depth.) However, there are other ways of exploiting this where NoScript might not work.

    Some users have reported being unable to reproduce this error. I will test more to try to establish what makes this work and not. So far it appears Mac users are not affected by this.
    http://isc.sans.org/diary.php?storyid=920
    SANS - Internet Storm Center - Cooperative Cyber Threat Monitor And Alert System

  2. #2
    Well that's a relief!

    This reminds me, I need to update to 1.5.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •