Firefox Bug Could Be Serious

A security firm fears that a zero-day vulnerability in a fully-patched and most-current version of Mozilla Corp.'s Firefox could be exploited.

April 25, 2006

2 Min Read
NetworkComputing logo in a gray background | NetworkComputing

A zero-day vulnerability in a fully-patched and most-current version of Mozilla Corp.'s Firefox could be exploited to crash the browser at the least, and at the worst, possibly introduce malicious code, a security company warned Tuesday.

The bug, which first appeared on Mozilla's Bugzilla listing a week ago on April 18, could be used by an attacker to crash Firefox by feeding it malformed JavaScript code.

Proof of concept code has been made public that crashes Firefox 1.5.0.2, the open-source browser's newest edition.

Although Danish vulnerability tracker Secunia ranked the threat as "low," its weakest warning, U.S.-based security vendor Symantec said the danger may be more dire.

"It does appear that triggering the vulnerability using the proof of concept results in the execution of data somewhere in anonymous memory, possibly in a portion of the heap," Symantec told customers of its DeepSight threat alert system Tuesday. "If this memory were somehow populated by an attacker with a malicious payload, this condition could likely be exploited to execute arbitrary code."Firefox developers have come up with a patch -- one is listed in the Bugzilla report -- but has not been pushed out to users. Typically, Mozilla releases Firefox updates that include several security patches as it did recently when it rolled out version 1.5.0.2 with fixes for 24 bugs.

JavaScript-based vulnerabilities aren't new to Firefox -- nor to its rival, Internet Explorer. Several of the flaws fixed in the April 14 release of Firefox 1.5.0.2, for instance, were associated with JavaScript.

Internet Explorer's biggest threat of late -- the "createTextRange" vulnerability that was used by malicious Web sites to infect PCs with spyware and adware before Microsoft unveiled a patch on April 11 -- was also JavaScript-based.

SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox

You May Also Like


More Insights