Firefox 3 Untimely Security Advisory

Although all the source code of Firefox is public and can be scrutinized during development at any time, a Tipping Point Security Advisory has been announced right in the middle of the Firefox 3 download day.
A unlucky coincidence, of course: only a conspiracy theorist could suspect that the timing had been chosen in order to maximize the hype effect for the Zero Day Initiative.

However Mozilla developers are working around the clock, and there’s already a patch being privately tested. All the information publicly available so far is that this vulnerability allows a malicious web page to trigger the execution of arbitrary code on the client side, and affects Firefox 2, 3 and likely all the products based on the same rendering engines. Technical details and exploitation proof of concepts are being kept private by Tipping Point as well until the patch is shipped, therefore Mozilla users should be relatively safe: after all we can be 99.99% sure every browser out there is vulnerable to something; we just hope that the bad guys don’t know the details yet.

I can add that, even in this case, NoScript users are the safest.

By ma1

Hacker, atheist, humanist, dad, mozillian, security breaker and builder, creator of NoScript, casting spells at the Tor Browser. He/him.

12 comments

  1. One of these days there’s going to be a code exec bug in the CSS parser or similar, and you’re not going to be able to say that….

  2. It might be untimely but I have no doubt that it was, in fact, timed by those who found it to appear on/after Download Day rather than reported during the RC process. I wonder if there’s a way to tweak bug bounties so that RC bugs get more $$…

    That said, release did flush it out before autoupdate kicked in for the 2.0.x stream, which is nice…

  3. @Mark Downling:

    release did flush it out before autoupdate kicked in for the 2.0.x stream, which is nice…

    Not sure, why exactly is it nice, considered that this bug affects Firefox 2.0.x as well?

  4. *Exactly* the same thing (although not tipping point) happened with wordpress 2.5 as well.

    It seems fashionable to find bugs in RC releases and wait until RELEASE to publish them.

  5. It happens many a times that there are some bugs in the old foundation(reusable modules) of software products which gets exposed when newer software versions are build on it. This case is very common with Windows. When Vista is tested for some attack/security hole , its also found to affecting XP.
    Such incidences proves the need of thorough and continuous regression of the foundational classes/reusable modules.

Comments are closed.