Mozilla Plans Fix For Critical Firefox Vulnerability In Next Release 140
Trailrunner7 writes "A month after an advisory was published detailing a new vulnerability in Firefox, Mozilla said it has received exploit code for the flaw and is planning to patch the weakness on March 30 in the next release of Firefox. Mozilla officials said Thursday that the vulnerability, which was disclosed February 18 by Secunia, is a critical flaw that could result in remote code execution on a vulnerable machine. The vulnerability is in version 3.6 of Firefox."
1.5 months for a response and release?! (Score:1, Troll)
Re:1.5 months for a response and release?! (Score:4, Funny)
Re: (Score:2)
In actuality, it's more the egoist side of human nature. There is someone, somewhere that would likely fix it and recompile. Whether they can get past this idea that their code is their intellectual property and thus, "Someone will have to pay!" will determine if the world can move past such an ego and continue thinking about more important things than a silly exploit.
Re: (Score:2, Informative)
If you had taken the trouble to read the fine (and brief) article, you would be aware that the fix is already available in the release candidates.
Re: (Score:2)
I know this. I really wasn't referring to this exact instance... the daveime was speaking in generalities and I like to believe I was as well.
Re: (Score:3, Informative)
Re: (Score:2)
The flaw was disclosed to Mozilla only recently
Well, we don't actually know when the flaw was disclosed. We only know that it was acknowledged to be disclosed recently, but it could have been a while back. However, I don't have a problem with it taking time to do the find, fix and test. The fix for the bug may have ramifications in other parts of the code, and it takes time to check this.
I think people can be a bit unreasonable with their expectations of patch times.
Re: (Score:1)
Re: (Score:3, Informative)
A fix already exists, it's just not in the official release.
Re: (Score:2, Informative)
1) about:config
2) app.update.channel = beta
And join the beta testers :)
Re: (Score:1, Troll)
Re: (Score:2)
fixed... (Score:1)
Alternatively, users can download Release Candidate builds of Firefox 3.6.2 which contains the fix from here:
https://ftp.mozilla.org/pub/mozilla.org/firefox/nightly/3.6.2-candidates/build3/ [mozilla.org]
Re: (Score:3, Informative)
The 3.6.2 beta has worked fine for me, but those uncomfortable with that and not willing to wait can avoid the bug by using a 3.5x version. The vulnerability is only in 3.6 series releases.
Re: (Score:1)
I should be fine, then. I downgraded to Firefox 2 after I got tired of losing data (specifically, open tabs) to two different bugs that were introduced in 3.0 and are still present in 3.6.
Maybe Firefox 4 will be better...
Re: (Score:2)
This seems like a very risky strategy to me. If the vulnerability is already in the wild they should be pushing out the fix ASAP. If it's not in the wild they should be keeping details quiet until they can make a proper release.
Re: (Score:2, Informative)
RTFS
March 30th.
The REAL question is, (Score:2)
"But, does it run on Linux?"
Hey, if the damned exploit won't run on Linux, then it's not a real exploit, is it? This kind of thing kinda pisses me off. There are all KINDS of neat software out there, that just won't run on Linux. It's definitley not fair. I think it might even be illegal. In today's modern world, no one is supposed to be excluded from anything. Not even nerds!!
What kept them? (Score:2)
Ok, so, since the summary didn't make this clear and I didn't find any explanation in the article, maybe someone on Slashdot can shed some light on this. What took Mozilla so long? It's a critical vulnerability that allows remote code execution. Why did is it taking over a month to fix?
Re:What kept them? (Score:4, Informative)
Re: (Score:1, Insightful)
Re:What kept them? (Score:5, Funny)
Re: (Score:1)
Re: (Score:2)
Yeah, no botnet creator in his right mind is going to target lynx.
Re: (Score:1)
Re: (Score:1)
Lynx is pretty secure
Even Lynx has had security issues. While searching for an example, I found this [cgisecurity.com], which is even better ;-)
Re: (Score:1)
Re: (Score:3, Insightful)
No one claims Firefox is perfect (or any browser for that matter) but IE gets more grief because it most certainly has more problems than the rest. If it weren't for competition as well we'd probably still be stuck on IE6 too since MS was quite happy to stop updating IE when they thought they had the market cornered.
So no need to get defensive about an awful
Re: (Score:2, Flamebait)
No one claims Firefox is perfect
Part of the problem with trying to have a sensible discussion on this topic is that so many people do pretty much claim $FOSS_APP is perfect: with enough eyes, all bugs are shallow, yada yada. If a large chunk of your culture and advocacy is based on that sort of foolishness, you're bound to get negative press when inevitably you can't always live up to your own hype.
Even the parent poster seems to be somewhat guilty of this, throwing in a couple of knee-jerk IE bashing responses. Have you actually looked a
Re: (Score:2)
Re: (Score:2)
It's a fundamental flaw in the architecture, which allows (at a minimum) any web page to trivially lock up the entire browser, causing the loss of whatever is being done in the other tabs.
Further details available in Customer Area (Score:2)
It's a critical vulnerability that allows remote code execution. Why did is it taking over a month to fix?
Answer: Further details available in Customer Area [secunia.com]
Re: (Score:1, Interesting)
Regardless of your stance on full disclosure, disclosure in return for payment seems to be little more than extortion. I'm going to blame this one on secunia.
So this just shows, that you can't relax. (Score:2, Insightful)
Re: (Score:2)
Your point, that data can be more valuable than system integrity and is not protected by Linux-style user vs. root access control, is excellent. I just wanted to pick up on this comment:
For me, at least, my personal data is far more important than my OS! Corporate networks may disagree.
Anywhere I've ever worked, the corporate network would agree with you, and strongly. Replacing a compromised machine is just a format and reinstall of a drive image, something Corporate IT do all the time with new machines anyway. On the other hand, losing confidential information about business plans, trade secrets, or God
Re: (Score:2)
Just because you run Firefox, you can't relax about malware attacks. Not on Windows anyway. Imagine how quickly an exploit of this type could be integrated into a malware kit, already running on countless compromised sites? No one can relax about buffer/stack smashing, dangling pointers, etc..., until there's a bulletproof safeguard against them built into the OS/processor architecture.
Agreed. Personally I use Gentoo Hardened [gentoo.org] with PaX and Grsecurity in the kernel plus a hardened toolchain and userspace measures against buffer overflows. That includes things like address randomization, non-executable pages, mprotect() restrictions, etc. Further measures are also available, like capability systems. It's good, though I would not call it "bulletproof", not even if I thought it was.
Really none of this is any substitute for patching known vulnerabilities. What it does provide is a secon
Re: (Score:1)
Re: (Score:2)
I'd be interested in knowing what options are available for similarly hardening Windows. What I'd really like to see is for the average system to become difficult enough to compromise that there is no longer fertile ground for automated attacks and the botnets that follow. I think that's achievable too, if we really wanted to do it.
You could start with using the features already provided in Windows http://technet.microsoft.com/en-us/library/cc507874.aspx [microsoft.com] and http://www.microsoft.com/downloads/details.aspx?familyid=A3D1BBED-7F35-4E72-BFB5-B84A526C1565&displaylang=en [microsoft.com].
The nice part is that almost all of the security settings are trivially deployed via Active Directory and GPOs. Deploying Linux security settings in a corporate environment generally involves rolling your own scripts and distribution methods.
I'm not saying Windows does
Re: (Score:3, Interesting)
I
Re: (Score:2)
The ubuntu version of sandboxie is apparmor. You can install apparmor-profiles that include profiles for a lot of apps.
https://help.ubuntu.com/community/AppArmor?action=fullsearch&context=180&value=linkto%3A%22AppArmor%22 [ubuntu.com]
Since Ubuntu 9.10 (Karmic), AppArmor ships with a profile for Firefox which is disabled by default.
You can enable it using the following command:
sudo aa-enforce /etc/apparmor.d/usr.bin.firefox-3.5
Re: (Score:1)
Re: (Score:3, Informative)
(And even if your old CPU doesn't support the NX bit, DEP will work for you as they have a software emulation for it in the OS.)
Not true. The DEP code on machines without NX bit support in the page tables will only protect you from a certain category of attack involving Microsoft's Structured Exception Handling system.
Contrast this with the OpenBSD implementation, which uses the x86 segment protection mechanism to enforce W^X when the NX bit is not present.
Someone enlighten me (Score:4, Insightful)
Why are companies so unwilling to micro-patch their software? If Mozilla has a fix NOW, why are they waiting another ~2 weeks to push it out with the next minor upgrade? Just to avoid making users upgrade too often?
Re: (Score:3, Informative)
QA. New releases need to go through QA anyway to make sure they haven't botched anything up.
Usually the release process for a large piece of software requires a certain degree of human interaction (anywhere from light to extreme), and there's always the possibility that something will mess up, even if the bugfix itself is perfectly trivial or safe.
It's not fixed until it's QA'd (Score:2)
So you can get the untested version now which may or may not fix the vulnerability and potentially botch-up your system. This is better than waiting until March 30th in what way?
Re: (Score:1)
Supporting Firefox by beta testing it?
Re: (Score:2)
Yes, i know.
I'm asking why companies insist on patching 20-30 things all at the same time, surely it is easier to test for regressions when you're only including a single patch? Why can't you patch, test, release, and move on to the next problem?
Isn't this what MS does with their micro-patch KB fixes?
Re: (Score:2)
I interviewed with Mozilla a few years back when they were looking for a Release Engineer. I think you underestimate the amount of work that goes into producing a release. Firefox is released in 70+ languages for 3 platforms. On top of this they release upgrade versions and not just full binaries, which of course is different for each platform. So you're looking at around 420+ different versions. There are also branded versions as well, which adds even more versions.
This was a few years ago and they we
Re: (Score:2)
Right, but isn't the end result of the way they do things right now, an increase in the time between disclosure and patching of critical security vulnerabilities?
Re: (Score:2)
First of all I think you need a timeline to help you understand how this vulnerability was handled:
Feb 1st, 2010: VulnDisco is updated with a zero day exploit for Firefox 3.6. No details on how the exploit works are provided. The exploit is only available in binary form when you buy a copy of VulnDisco. Some people buy VulnDisco and have difficulty in making the exploit work. https://forum.immunityinc.com/board/thread/1161/vulndisco-9-0/ [immunityinc.com]
March 16th, 2010: First 3.6.2 nightly builds that contain a fix are
Re: (Score:2)
Because you'd be running the test case 20-30 times? And people really, really, really hate updating their software hourly?
That means for each patch they have to go through a whole release test of the software,
Re: (Score:2)
Surely the QA should not take that long though. There are plenty of people willing to test the code.
Microsoft uses the excuse that they need to test every language on every OS version in every configuration but what is worse - breaking the Hungarian version on Windows XP SP2 or leaving everyone with an unpatched critical vulnerability for weeks?
Re: (Score:2)
> There are plenty of people willing to test the code.
Are there? The number of people testing your typical Firefox minor release is about an order of magnitude lower than the number of people testing bleeding-edge Firefox trunk last I checked. And it's at least two orders of magnitude lower than the number of people testing a major release beta.
If you talk to the Mozilla QA and release folks, one of their big problems is in fact the lack of minor release testers...
Re: (Score:1)
Re: (Score:2)
I'm not sur eif the fix was pushed out already because this week I've have updates cropping up for all my instances of Firefox at home and work. So either they're early or I'll get another one on the 30th. Either way, they're clearly doing their best.
Re: (Score:2)
I guess that it's because it costs a ton of bandwidth (and thus money) to make a patch available.
Mozilla's patch system is pretty ugly, since it needs to download 3 megabytes for a few bytes changed.
And NO, it doesn't have anything to do with validating the patch, since it's very easy to check that the behaviour doesn't change, especially when the impact is very small.
Microsoft uses the "we need some time to check the patch" because they have to maintain a lot of differents versions of their OS.
Re: (Score:2)
But surely a 3MB patch is still less than the entire browser download - so therefore less bandwidth?
Re: (Score:1, Flamebait)
And what's funnier still is that no one likes Opera or really gives a fuck about it.
Re: (Score:1, Offtopic)
There are more beetles grubbing in shit, too. Do you have a point?
Re: (Score:3, Insightful)
Because the fix could break other things, or even not actually fix anything or fix the security vulnerability completely, or even cause a different security vulnerability (possibly worse).
Testing is important, especially when you want to attract users, not drive them away. Unstable software will do that.
Re: (Score:3, Informative)
Re: (Score:2)
If the vulnerability were publicly (fully) disclosed, perhaps Mozilla would rush a fix out the door. As far as I know, there has been limited disclosure of the vulnerability to only a few parties, and I haven't heard that the vulnerability is being exploited.
You mean like having an automated exploit tool published 1-1/2 months ago? https://forum.immunityinc.com/board/thread/1161/vulndisco-9-0/ [immunityinc.com]
Re: (Score:2)
In Linux world, it’s normal that the packages you get via your package manager have custom patches in them. So we get the fixes ASAP anyway. (Of course Windows, being the Playmobil OS that is is, lacks a general package manager.)
But I also wonder why they don’t just shove the minor updates in patch form trough their update functionality. Just like addons can get updated every time you start Firefox. It would be what? A a couple of bytes?
Re: (Score:2)
> Just to avoid making users upgrade too often?
Yes. The typical monthly Firefox minor update ships on the order of 30-100 fixes depending on the month (security problems, stability problems, compat problems, etc). Micro-patching would involve 1-3 upgrades a day.
If the upgrade could happen silently and without any user notification (which is what Chrome is working and and what Mozilla would like to get to), that may be acceptable. But even just telling the user three times a day "hey, I just updated" i
Re:OMFG (Score:5, Insightful)
Secunia: omfg Firefox has a vulnerability!!! ... ...
Mozilla: ok so what are the specifics?
Secunia:
Mozilla: Hello?
Secunia:
Mozilla: Anyone?
Secunia a few days ago: Right then... here are the details...
Mozilla: *patched beta*
Re: (Score:1)
People just have no respect for good professional showmanship.
Re: (Score:3, Insightful)
Maybe it was more like this:
Secunia: omfg Firefox has a vulnerability!!! ... (puts it on black hat exploit auctions) ... (sells it to the highest bidders)
Mozilla: ok so what are the specifics?
Secunia:
Mozilla: Hello?
Secunia:
Mozilla: Anyone?
Secunia a few days ago: Right then... here are the details... (Milked it enough)
Mozilla: *patched beta*
Re: (Score:2)
I love the way you implicitly assume that exactly the same problems don't apply to Microsoft/IE, or any other browser development team.
Did you realise that you are the guy the grandparent post was mocking?
Re: (Score:2)
Mozilla has earned the benefit of the doubt.
Microsoft has a proven track record of ill will, negligence and general contempt for its customers. Therefor it is generally met with suspicion and distrust and has to proof there case every time because of it.
Karma is a bitch.
I dunno I don't think they are as bad as MS but i'm not sure I trust either the firefox codebase or the mozilla guys.
The memory "leak" saga and the fact that afaict they don't treat all crash bugs as high priority becausue they are potential vulnerabilities (until you figure out what causes a crash you don't know if it's exploitable) don't exactly inspire confidence. Neither does delaying an exploit to the next regular release rather than adding the fix to the latest current release and making release ASAP
Damn youtube made me upgrade. (Score:1)
Re:Planning? It's not enough! (Score:5, Informative)
Are you being intentionally ridiculous?
The fix is in the latest beta release already, that binary is slated to be the release candidate, and if testing goes well, it will be the release.
Re: (Score:2)
It doesn't count until it's publicly released, Otherwise the majority of the browsers are still not patched...
Re:Planning? It's not enough! (Score:4, Informative)
As someone else already quoted:
Mozilla already has released a beta build of Firefox 3.6.2, which contains the fix for the unpatched vulnerability
You can already go and download that 3.6.2 beta [mozilla.org] if you want, I did.
The 'planning' is about the data of 3.6.2's release, not whether or not it will have this fix included.
Re: (Score:2)
Re: (Score:1)
Because it is a beta. They don't want to support the people who can't find it on their own.
Re: (Score:2)
Hiding the patch doesn't really make any sense. I suspect they just didn't want to do the work to make its location more obvious.
Re: (Score:2)
Re: (Score:1)
Do you have any evidence of this exploit being used in the wild?
(Of course, I was mostly being a jerk in my previous comment, but it really isn't that shocking that they are following their standard release procedure here)
Re: (Score:1)
No Linux/x86_64 version is available there...
Re: (Score:1)
Re: (Score:2)
As others have pointed out, there is already a patch and I have looked at it myself.
Re: (Score:1, Offtopic)
With a small amount of work you can post from a different IP address every time.
Or it might be a dozen different losers cutting and pasting the same thing.
BTW, a reaction like yours will keep them motivated and posting, thanks ever so much.
Re: (Score:1, Offtopic)
Congratulations, you just encourage it. Twice, and with multiple replies. The moderation system is designed to account for this stuff. It's designed so you just need a single person with a single mod point to mark it as troll or flamebait, cleaning up the comments for others.
The only thing you've said that makes sense is filtering multiple copies of things. Everything else is heavy-handed censorship type stuff. Police involved for being racist? That's excessive.
Just ignore it. It's going to be harder
Re: (Score:1, Offtopic)
With the language the same in every single post, why doesn't slashdot just filter this out to the garbage before it gets posted.
Yes, because no-one would change a word or two in their post or do variations on the spelling. Yay, we get to have another lameness-filter style arms race, that'll improve the quality of the posts.
Maybe we should have a "-1 hate crime" mod, and the overlords can determine what to do with it. As it is, I only see myself or other mods pushing it down, thus wasting one of my mod points whereas I can be modding someone "+1 interesting" instead.
Maybe you should grow a skin and realize that you can't win this kind of pissing contest with griefers.
Seriously, just ignore it.
This very moment, some guy in his mom's basement has his pants down fwapping away to your outrage. You've provided motivation for gods know how many more cut'n'paste trolls, because you
Re: (Score:1, Offtopic)
good - wasting time commenting on this stuff keeps them motivated to post.
that said, after reading your comment, I had to see what the fuss was about.. I found it quite amusing really. Well, no less amusing that "installing boyfriend 2.0" or "upgrading girlfriend to wife", or any Irish, Polish, or random celebrity jokes that no-one seems to have a problem with. (I'm not American so I don't have the same 'horror' of the N word BTW, round here it's the C word that's the 'uh-oh' one).
It obviously falls into th
Re: (Score:2)
(I'm not American so I don't have the same 'horror' of the N word BTW, round here it's the C word that's the 'uh-oh' one).
Cracker? Communist?
Re: (Score:2)
Yeah, these copypasta trolls are tedious and annoying, but this guy is no worse than the tron fanzine guy, the library shit-eater, and the GNAA's broken Markov chain that posts the goatse links. He's just another retard.
Re: (Score:1, Offtopic)
fortunately for you, being an idiot is also completely legal
Re: (Score:2)
Apart from what the SP says, that doesn't mean that hate speech laws are a good thing. Haven't you heard the saying "sticks and stones may break my bones, but words shall never hurt me"? That sort of post isn't libellous, slanderous, or defamatory, because it wouldn't actually harm anyone's opinion of either a specific black person or black people in general (anyone who would take it seriously would already believe that crap), and there is no measurable harm done by it.
Even hate crime laws are pretty silly
Re: (Score:1)
Re: (Score:2)
I can't believe my first comment got modded down twice as flamebait; slashdot has really descended technically, apparently, to judge so poorly what is a serious technical comment by someone who has been programming for about thirty years (and who even taught C at the university level and has used C++ extensively in the past, including at IBM Research).
So sad to put a little performance (and questionably) these days ahead of security as well as ease of programming, extendability, and maintainability.
While I
Re: (Score:1)
I majored in java (and I really do love java) but I now work in perl. So, certainly, it sounds like you'd be in a better spot to judge what would be the best implementation language. Also just noticed your low uid!
You really think firefox should've been developed in java? I would've thought it would be problematic for that type of project that needed portability, minimal footprint (no jvm), and perhaps lack of an environment that might promote over-engineering?
Like I said, you have the experience, you reall
Re: (Score:2)
A lot of these issues are relative to your priorities and also technical change. What does "minimal footprint" mean these days on eight core Mac Pro with tens of Gigabytes of memory, and where most of the memory is used by cached pages of a web browser, not the application itself? There is a value to Firefox being in C++ from the standpoint of it being embedded somehow in other C++ applications (including embedded software) -- although, on the flip side, it makes it difficult to embed it in Java application
Re:Updating... how to? (Score:4, Informative)
Re: (Score:1)