Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Mozilla confirms critical Firefox 3.6 bug

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
Home » Discuss » DU Groups » Computers & Internet » Computer Help and Support Group Donate to DU
 
Earth Bound Misfit Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Mar-19-10 05:52 PM
Original message
Mozilla confirms critical Firefox 3.6 bug
Edited on Fri Mar-19-10 05:55 PM by Earth Bound Misfit
Slates patch for March 30; flaw can't be used in upcoming Pwn2Own hack contest
By Gregg Keizer
March 19, 2010 04:05 PM ET
http://www.computerworld.com/s/article/9173698/Moz...

Computerworld - Mozilla yesterday confirmed a critical vulnerability in the newest version of Firefox, and said it would plug the hole by the end of the month.

Although the patch won't be added to Firefox before next week's Pwn2Own browser hacking challenge, researchers won't be allowed to use the flaw, according to the contest's organizer.

"The vulnerability was determined to be critical and could result in remote code execution by an attacker," Mozilla acknowledged in a post to its security blog late Thursday. "The vulnerability has been patched by developers and we are currently undergoing quality assurance testing for the fix."
------------------------------------
Mozilla Firefox Unspecified Code Execution Vulnerability
19th Mar, 2010 05:39
http://secunia.com/community/forum/thread/show/3586

Update on Secunia Advisory SA38608

03.18.10 - 08:20pm

Mozilla was contacted by Evgeny Legerov, the security researcher who discovered the bug referenced in the Secunia report, with sufficient details to reproduce and analyze the issue. The vulnerability was determined to be critical and could result in remote code execution by an attacker. The vulnerability has been patched by developers and we are currently undergoing quality assurance testing for the fix. Firefox 3.6.2 is scheduled to be released March 30th and will contain the fix for this issue. As always, we encourage users to apply this update as soon as it is available to ensure a safe browsing experience.
----------------------------------------
1. Black Hatter announces a "vulnerability" in the hopes that someone buys his software. He also threatens not to release the vulnerability.
2. All news sites and security sites publicize the story without any confirmation.
3. Mozilla refuses to "pay up".
4. The vulnerability does not seem to affect a lot of people and Mozilla goes ahead and announces that they will release 3.6.2 anyways.
5. Hacker realizes that he is being foolish and releases the code:)

I posted this on the Secunia Forum linked above:

I cant wait for the movie-- Starring Matt Damon as Mozilla Corp CEO John Lilly, John Malkovich as Evgeny "KGB" Legerov, Edward Norton and Michael Rispoli... http://www.imdb.com/title/tt0128442/quotes

Edit spelling, correct link.

As John Lennon once sang: Strange Days, Indeed. Most peculiar Mama.
http://www.youtube.com/watch?v=gBCdlBrgEmE
Refresh | 0 Recommendations Printer Friendly | Permalink | Reply | Top
EvolveOrConvolve Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Mar-19-10 06:05 PM
Response to Original message
1. Firefox has become a lot more vulnerable
Not because it has become less secure, but because the number of users running it as their primary browser makes it a worthwhile venture for hackers to find holes in it. Just as Windows is hit hard because of its market dominance, Firefox is starting to feel the pain of gaining a significant market share in the browser wars.
Printer Friendly | Permalink | Reply | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Wed May 01st 2024, 03:28 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » DU Groups » Computers & Internet » Computer Help and Support Group Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC