Security
Firefox security status
A major security flaw in various third-party extensions has given Firefox a bit of a black eye even though the browser is not vulnerable. A number of other issues in the browser itself caused a security release which kept Firefox in the news. Unfortunately, after the release, even more vulnerabilities were reported. One would have to guess that it has not been the best week or so for the Firefox security team.
A large number of extensions - including toolbars for Google, Yahoo, Facebook and others - are susceptible to a man-in-the-middle attack that allows arbitrary code execution within the browser. The vulnerability exploits the update mechanism built into the extensions by providing malicious code as an update. An attacker that can control the DNS answers received by a victim can redirect the update queries from the extensions to a server under the attacker's control. The code provided gets installed, silently in many cases; it will then run as part of the browser with all of the capabilities of an extension.
Situations where one may not be able to trust the DNS answers received are far more common than people realize. Using a public or unencrypted wireless network is probably the most common vulnerable situation, but home routers that have been subverted either through a vulnerability or because the owner never changed the default password can also leave an opening for an attack. Because the extensions typically check for updates frequently, there are lots of opportunities to provide them with bad code.
There are any number of nasty things that a browser extension can do: keystroke logging, email reading, spamming, bank transfers, subscribing to LWN.net, etc. This is truly a situation that one wants to avoid. Vendors of these extensions have in many cases (with Google being specifically called out in the vulnerability announcement) bypassed the default Firefox prompt that would at least alert users that new code was being installed. Users running those extensions have no defense and need to delete them from the browser while awaiting a fix from the vendor.
The open source extensions that are available at https://addons.mozilla.org are not vulnerable because of the use of SSL to prevent an attacker's host masquerading as the update server. The SSL certificate presented by the attacker's server will not pass muster with the browser so the malicious update will not be installed. This is the fix that the vulnerable extensions will have to implement. It is not particularly technically difficult, more of a logistics headache to roll out new code to millions of users. It may also require some infrastructure improvements to be able to support encrypted connections for that many users.
Millions of users at risk for all manner of browser mayhem may make the fixes in the most recent security update pale by comparison but there are some serious issues there as well. The most important fix, rated as critical by Mozilla, fixes potentially exploitable crashes in the layout and Javascript engines. There is also a flaw that allows cross-site scripting using the addEventListener Javascript call which Mozilla rates as having a high impact.
A few days after the release, Michal Zalewski was up to his usual tricks by reporting two vulnerabilities in Firefox, one that he rates as a major vulnerability, the other as medium. In both cases, various Javascript tricks can be used to make the browser behave badly which is yet another reason to look into the NoScript extension.
Thor Larholm also had some bad news for the Firefox team shortly after the release when he reported that a patch that went into the 2.0.0.4 release only partially fixed the problem for Windows platforms while doing nothing to prevent the problem for Linux and other UNIX versions. The directory traversal vulnerability allows any local files accessible to the browser user with the name known by the attacker to be read via the resource:// URL handler. The information in the file could then be transmitted to any site visited. We can probably expect an update from the Firefox team for this particular problem relatively soon.
Brief items
Google: Web Server Software and Malware
Google has published the results of some research on web servers and malware. "It is very interesting to see that in China and South Korea, a malicious server is much more likely to be running IIS than Apache. We suspect that the causes for IIS featuring more prominently in these countries could be due to a combination of factors: first, automatic updates have not been enabled due to software piracy, and second, some security patches are not available for pirated copies of Microsoft operating systems. For instance the patch for a commonly seen ADODB.Stream exploit is not available to pirated copies of Windows operating systems." So the problem may not be that the software is inherently less secure, but that its proprietary licensing cuts off many deployments from security updates.
New vulnerabilities
clamav: denial of service
Package(s): | clamav | CVE #(s): | CVE-2007-2650 | ||||||||||||||||||||||||
Created: | June 5, 2007 | Updated: | July 20, 2007 | ||||||||||||||||||||||||
Description: | A vulnerability in the OLE2 parser in ClamAV was found that could allow a remote attacker to cause a denial of service via resource consumption with a carefully crafted OLE2 file. | ||||||||||||||||||||||||||
Alerts: |
|
file: integer overflow
Package(s): | file | CVE #(s): | CVE-2007-2799 | ||||||||||||||||||||||||||||||||||||||||
Created: | June 1, 2007 | Updated: | October 19, 2007 | ||||||||||||||||||||||||||||||||||||||||
Description: | Colin Percival from FreeBSD reported that the previous fix for the file_printf() buffer overflow introduced a new integer overflow. A remote attacker could entice a user to run the file program on an overly large file (more than 1Gb) that would trigger an integer overflow on 32-bit systems, possibly leading to the execution of arbitrary code with the rights of the user running file. | ||||||||||||||||||||||||||||||||||||||||||
Alerts: |
|
firefox: multiple vulnerabilities
Package(s): | firefox mozilla seamonkey thunderbird | CVE #(s): | CVE-2007-1362 CVE-2007-2867 CVE-2007-2868 CVE-2007-2869 CVE-2007-2870 CVE-2007-2871 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Created: | June 4, 2007 | Updated: | August 29, 2007 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description: | Various flaws were discovered in the layout and JavaScript engines. By
tricking a user into opening a malicious web page, an attacker could
execute arbitrary code with the user's privileges. (CVE-2007-2867,
CVE-2007-2868)
A flaw was discovered in the form autocomplete feature. By tricking a user into opening a malicious web page, an attacker could cause a persistent denial of service. (CVE-2007-2869) Nicolas Derouet discovered flaws in cookie handling. By tricking a user into opening a malicious web page, an attacker could force the browser to consume large quantities of disk or memory while processing long cookie paths. (CVE-2007-1362) A flaw was discovered in the same-origin policy handling of the addEventListener JavaScript method. A malicious web site could exploit this to modify the contents, or steal confidential data (such as passwords), of other web pages. (CVE-2007-2870) Chris Thomas discovered a flaw in XUL popups. A malicious web site could exploit this to spoof or obscure portions of the browser UI, such as the location bar. (CVE-2007-2871) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Alerts: |
|
jasper: denial of service
Package(s): | jasper | CVE #(s): | CVE-2007-2721 | ||||||||||||||||||||||||||||||||||||||||||||||||
Created: | June 1, 2007 | Updated: | April 19, 2010 | ||||||||||||||||||||||||||||||||||||||||||||||||
Description: | The jpc_qcx_getcompparms function in jpc/jpc_cs.c could allow remote user-assisted attackers to cause a denial of service (crash) and possibly corrupt the heap via malformed image files. | ||||||||||||||||||||||||||||||||||||||||||||||||||
Alerts: |
|
lha: temporary file vulnerability
Package(s): | lha | CVE #(s): | CVE-2007-2030 | ||||
Created: | June 6, 2007 | Updated: | June 6, 2007 | ||||
Description: | The lha utility creates temporary files in an insecure manner, enabling symlink race attacks. | ||||||
Alerts: |
|
libexif: integer overflow
Package(s): | libexif | CVE #(s): | CVE-2007-2645 | ||||||||||||||||||||||||||||||||||||||||
Created: | June 1, 2007 | Updated: | February 11, 2008 | ||||||||||||||||||||||||||||||||||||||||
Description: | Integer overflow in the exif_data_load_data_entry function in exif-data.c in libexif before 0.6.14 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted EXIF data, involving the (1) doff or (2) s variable. | ||||||||||||||||||||||||||||||||||||||||||
Alerts: |
|
php: multiple vulnerabilities
Package(s): | php | CVE #(s): | CVE-2007-2872 CVE-2007-2756 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Created: | June 1, 2007 | Updated: | January 29, 2008 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description: | According to a vendor release announcement multiple security enhancements and fixes were fixed in version 5.2.3 of the programming language PHP. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Alerts: |
|
php-pear: directory traversal
Package(s): | php-pear | CVE #(s): | CVE-2007-2519 | ||||||||
Created: | June 5, 2007 | Updated: | June 6, 2007 | ||||||||
Description: | Directory traversal vulnerability in the installer in PEAR 1.0 through 1.5.3 allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in the (1) install-as attribute in the file element in package.xml 1.0 or the (2) as attribute in the install element in package.xml 2.0. NOTE: it could be argued that this does not cross privilege boundaries in typical installations, since the code being installed could perform the same actions. | ||||||||||
Alerts: |
|
Sun JDK/JRE: multiple vulnerabilities
Package(s): | Sun JDK/JRE | CVE #(s): | CVE-2007-2435 CVE-2007-2788 CVE-2007-2789 | ||||||||||||||||||||||||
Created: | June 1, 2007 | Updated: | April 18, 2008 | ||||||||||||||||||||||||
Description: | An unspecified vulnerability involving an "incorrect use of system classes" was reported by the Fujitsu security team. Additionally, Chris Evans from the Google Security Team reported an integer overflow resulting in a buffer overflow in the ICC parser used with JPG or BMP files, and an incorrect open() call to /dev/tty when processing certain BMP files. | ||||||||||||||||||||||||||
Alerts: |
|
wpa_supplicant: buffer overflow
Package(s): | wpa_supplicant networkmanager | CVE #(s): | |||||||||
Created: | June 5, 2007 | Updated: | June 6, 2007 | ||||||||
Description: | A buffer overflow flaw was found in the debugging code of Fedora's version of wpa_supplicant. This can be triggered by those using NetworkManager. It is recommended that users of wpa_supplicant or NetworkManager update to this package (and the accompanying NetworkManager packages) which removes the affected debug code. | ||||||||||
Alerts: |
|
Page editor: Jonathan Corbet
Next page:
Kernel development>>