Security
Security implications for user interface changes?
Free software users are not generally known for their quiet acceptance of user interface changes. Many changes to the UI of desktop environments or popular applications lead to long and loud threads from users—with some percentage of those users claiming they will move to an alternative rather than "put up" with the change. But what happens if the alternative is to stick with an earlier, unsupported version of the application? That's the question that came up in a short, but interesting, thread on the Mozilla security mailing list.
Plans for Firefox to remove the "tabs on bottom" feature have so incensed a vocal subset of users (see this bug report or this lengthy thread on the mozilla.dev.apps.firefox group) that they don't plan to upgrade the browser once this change is implemented. For many releases now, Firefox has had its tabs below the controls and "awesome bar", which is the behavior called "tabs on bottom". More recent versions have had a "Tabs on top" toggle in the toolbar configuration, which moves the tabs to just below the menu (and above the controls and awesome bar). The toggle is slated for removal, with tabs on top becoming the default. The old behavior will still be available by setting browser.tabs.onTop to false in about:config, but users are concerned that will eventually disappear as well.
The ferocity of the arguments against moving the tabs (and removing the toggle) led Zack Weinberg to suggest keeping the toggle and feature:
Web browsers, by their nature, need frequent updates. Because browsers face the often hostile internet and can provide a portal to users' documents, photos, passwords, and so forth, it is critically important for users to keep up with browser updates. Anything that gets in the way of that process is (and should be) worrisome. That is the main reason that Chrome and Firefox have moved to automatic updates, for example.
But there is a tradeoff to be made here. Mozilla's VP of Firefox
Engineering Johnathan Nightingale argues
that, over the years, too much attention has been paid to the most
vocal user contingent. There is code that is "in desperate need of
clean up
", he said, so Firefox developers cannot necessarily afford
to heed the negative feedback:
Every community has conservative elements. They are helpful; they remind us who we are when we forget. But conservative forces prevent change (by definition!) and we have important aspects of our code that need changing.
Weinberg is not convinced that cleaning up the code base overrides the security issue, however. He is concerned that the "tabs on bottom" issue is really just the straw that broke the camel's back for some segment of users. Even a small percentage of the Firefox install base can make for a rather large problem:
Drawing a clear line is difficult, though. If any change to the UI can be seen as a "security problem" because users might decide not to upgrade, it will be difficult for Firefox to make any changes. Users have to take some responsibility for their choices. As Curtis Koenig put it:
Users will make poor choices at times, and it is certainly possible that
some change will drive some of them to make those choices. Is there a
"moral responsibility
", as Weinberg claimed, for Firefox (and, by implication, other
applications, desktops, etc.) to continue to deliver a user experience that
its users have become accustomed to? Are UI changes always potential
security problems? There are obviously some kinds of UI changes that are
security flaws, but simply changing the way the user interacts with the
program likely doesn't really reach that level.
Both Koenig and Nightingale do not see the "tabs on bottom" change as a
security issue. There may be design or development issues that need to be
resolved—though Nightingale seems confident that those have largely been dealt
with—but changing some UI elements around is not cause for a security red
flag. In fact, Nightingale called the security concern "a red
herring (or a slippery slope, take your pick)
".
There is only so much that a project can do to protect its users. Part of the problem with this particular case is that the other "major" free alternative, Chrome/Chromium, also has its tabs at the top. One guesses that the uproar would be good deal more subdued if there were an "easy" alternative that behaved the way the "vocal conservatives" want. There may be good reasons to consider leaving the "tabs on bottom" feature alone; security isn't really one of them. But it is always good to see projects thinking about and debating where these lines are.
Brief items
Security quotes of the week
The documents contained confidential information, including detectives' Social Security numbers, bank information and unveiled undercover officers' identities, WPIX-TV, New York, reported.
Backdoor inserted into Piwik
The Piwik web server analytics package was given an undesirable feature — a backdoor — as the result of a compromise of the piwik.org server. "You would be at risk only if you installed or updated to Piwik 1.9.2 on Nov 26th from 15:43 UTC to 23:59 UTC. If you are not using 1.9.2, or if you have updated to 1.9.2 earlier than Nov 26th 15:40 UTC or from Nov 27th, you should be safe." The announcement has details on the backdoor and how to detect it.
New vulnerabilities
awstats: unspecified vulnerability
| Package(s): | awstats | CVE #(s): | CVE-2012-4547 | ||||||||
| Created: | November 28, 2012 | Updated: | April 8, 2013 | ||||||||
| Description: | From the CVE entry:
Unspecified vulnerability in awredir.pl in AWStats before 7.1 has unknown impact and attack vectors. | ||||||||||
| Alerts: |
| ||||||||||
bugzilla: multiple vulnerabilities
| Package(s): | bugzilla | CVE #(s): | |||||||||
| Created: | November 26, 2012 | Updated: | November 28, 2012 | ||||||||
| Description: | From the Fedora advisory:
Update to 4.0.9
| ||||||||||
| Alerts: |
| ||||||||||
firefox: multiple vulnerabilities
| Package(s): | firefox | CVE #(s): | CVE-2012-5843 CVE-2012-5836 CVE-2012-4203 CVE-2012-4204 CVE-2012-4205 CVE-2012-4208 CVE-2012-4212 CVE-2012-4213 CVE-2012-4217 CVE-2012-4218 CVE-2012-5838 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Created: | November 22, 2012 | Updated: | January 8, 2013 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Description: | From the Ubuntu advisory: Gary Kwong, Jesse Ruderman, Christian Holler, Bob Clary, Kyle Huey, Ed Morley, Chris Lord, Boris Zbarsky, Julian Seward, Bill McCloskey, and Andrew McCreight discovered multiple memory safety issues affecting Firefox. If the user were tricked into opening a specially crafted page, an attacker could possibly exploit these to cause a denial of service via application crash, or potentially execute code with the privileges of the user invoking Firefox. (CVE-2012-5842, CVE-2012-5843) Jonathan Stephens discovered that combining vectors involving the setting of Cascading Style Sheets (CSS) properties in conjunction with SVG text could cause Firefox to crash. If a user were tricked into opening a malicious web page, an attacker could cause a denial of service via application crash or execute arbitrary code with the privliges of the user invoking the program. (CVE-2012-5836) It was discovered that if a javascript: URL is selected from the list of Firefox "new tab" page, the script will inherit the privileges of the privileged "new tab" page. This allows for the execution of locally installed programs if a user can be convinced to save a bookmark of a malicious javascript: URL. (CVE-2012-4203) Scott Bell discovered a memory corruption issue in the JavaScript engine. If a user were tricked into opening a malicious website, an attacker could exploit this to execute arbitrary JavaScript code within the context of another website or arbitrary code as the user invoking the program. (CVE-2012-4204) Gabor Krizsanits discovered that XMLHttpRequest objects created within sandboxes have the system principal instead of the sandbox principal. This can lead to cross-site request forgery (CSRF) or information theft via an add-on running untrusted code in a sandbox. (CVE-2012-4205) Peter Van der Beken discovered XrayWrapper implementation in Firefox does not consider the compartment during property filtering. An attacker could use this to bypass intended chrome-only restrictions on reading DOM object properties via a crafted web site. (CVE-2012-4208) Abhishek Arya discovered multiple use-after-free and buffer overflow issues in Firefox. If a user were tricked into opening a malicious page, an attacker could exploit these to execute arbitrary code as the user invoking the program. (CVE-2012-4214, CVE-2012-4215, CVE-2012-4216, CVE-2012-5829, CVE-2012-5839, CVE-2012-5840, CVE-2012-4212, CVE-2012-4213, CVE-2012-4217, CVE-2012-4218) Several memory corruption flaws were discovered in Firefox. If a user were tricked into opening a malicious page, an attacker could exploit these to execute arbitrary code as the user invoking the program. (CVE-2012-5830, CVE-2012-5833, CVE-2012-5835, CVE-2012-5838) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Alerts: |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
hyper-v: denial of service
| Package(s): | Hyper-V | CVE #(s): | CVE-2012-2669 | ||||||||||||||||||||
| Created: | November 22, 2012 | Updated: | November 28, 2012 | ||||||||||||||||||||
| Description: | From the openSUSE advisory: The source code without this patch caused hv_kvp_daemon to exit when it processed a spoofed Netlink packet which has been sent from an untrusted local user. Now Netlink messages with a non-zero nl_pid source address are ignored and a warning is printed into the syslog. This fixes the previous change from CVE-2012-2669. | ||||||||||||||||||||||
| Alerts: |
| ||||||||||||||||||||||
insight: remote denial of service
| Package(s): | insight | CVE #(s): | CVE-2012-3509 | ||||||||||||||||||||||||||||||||||||||||||||
| Created: | November 26, 2012 | Updated: | August 22, 2014 | ||||||||||||||||||||||||||||||||||||||||||||
| Description: | From the CVE entry:
Multiple integer overflows in the (1) _objalloc_alloc function in objalloc.c and (2) objalloc_alloc macro in include/objalloc.h in GNU libiberty, as used by binutils 2.22, allow remote attackers to cause a denial of service (crash) via vectors related to the "addition of CHUNK_HEADER_SIZE to the length," which triggers a heap-based buffer overflow. | ||||||||||||||||||||||||||||||||||||||||||||||
| Alerts: |
| ||||||||||||||||||||||||||||||||||||||||||||||
kernel: denial of service
| Package(s): | kernel | CVE #(s): | CVE-2012-4461 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Created: | November 22, 2012 | Updated: | November 28, 2012 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Description: | From the Red Hat Bugzilla entry: A flaw has been found in the way Linux kernel's KVM subsystem handled vcpu->arch.cr4 X86_CR4_OSXSAVE bit set upon guest enter. On hosts without the XSAVE feature an unprivileged local user could use this flaw to crash the system. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Alerts: |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
libsocialweb: untrusted connection to flickr
| Package(s): | libsocialweb | CVE #(s): | CVE-2012-4511 | ||||||||
| Created: | November 23, 2012 | Updated: | November 28, 2012 | ||||||||
| Description: | From the Fedora advisory: The libsocialweb library is prone to a security vulnerability that allows attackers to perform man-in-the-middle attacks. Remote attackers can exploit this issue to gain access to sensitive information or modify the integrity of user accounts. Other attacks are also possible. | ||||||||||
| Alerts: |
| ||||||||||
libssh: code execution
| Package(s): | libssh | CVE #(s): | CVE-2012-4559 CVE-2012-4560 CVE-2012-4561 CVE-2012-4562 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Created: | November 27, 2012 | Updated: | February 24, 2014 | ||||||||||||||||||||||||||||||||||||||||||||||||
| Description: | From the Ubuntu advisory:
Xi Wang and Florian Weimer discovered that libssh incorrectly handled memory. A remote attacker could use this to cause libssh to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2012-4559, CVE-2012-4560, CVE-2012-4561, CVE-2012-4562) | ||||||||||||||||||||||||||||||||||||||||||||||||||
| Alerts: |
| ||||||||||||||||||||||||||||||||||||||||||||||||||
libssh2: multiple integer overflows
| Package(s): | libssh2 | CVE #(s): | CVE-2012-4562 | ||||||||||||||||||||
| Created: | November 22, 2012 | Updated: | November 29, 2012 | ||||||||||||||||||||
| Description: | From the SUSE advisory: This update of libssh fixes multiple integer overflows. CVE-2012-4562 has been assigned to this issue. | ||||||||||||||||||||||
| Alerts: |
| ||||||||||||||||||||||
libvoikko: denial of service
| Package(s): | libvoikko | CVE #(s): | |||||
| Created: | November 26, 2012 | Updated: | November 28, 2012 | ||||
| Description: | From the Mageia advisory:
Version 3.2.1 fixes the handling of embedded null characters in input strings entered through the Python interface. The bug could be used to cause denial of service conditions and possibly other problems. Users of these interfaces are recommended to upgrade to this release. Applications that use the native C++ library directly (this includes all well known desktop applications) are not affected by this bug and no changes to the native library have been made in this release. | ||||||
| Alerts: |
| ||||||
lighttpd: denial of service
| Package(s): | lighttpd | CVE #(s): | CVE-2012-5533 | ||||||||||||||||||||||||||||
| Created: | November 23, 2012 | Updated: | January 15, 2014 | ||||||||||||||||||||||||||||
| Description: | From the Novell advisory: Specially-crafted HTTP header can cause a Denial of Service (infinite loop) in lighttpd. | ||||||||||||||||||||||||||||||
| Alerts: |
| ||||||||||||||||||||||||||||||
mantis: multiple vulnerabilities
| Package(s): | mantis | CVE #(s): | CVE-2012-5522 CVE-2012-5523 | ||||||||
| Created: | November 26, 2012 | Updated: | November 28, 2012 | ||||||||
| Description: | From the CVE entries:
MantisBT before 1.2.12 does not use an expected default value during decisions about whether a user may modify the status of a bug, which allows remote authenticated users to bypass intended access restrictions and make status changes by leveraging a blank value for a per-status setting. (CVE-2012-5522) core/email_api.php in MantisBT before 1.2.12 does not properly manage the sending of e-mail notifications about restricted bugs, which might allow remote authenticated users to obtain sensitive information by adding a note to a bug before losing permission to view that bug. (CVE-2012-5523) | ||||||||||
| Alerts: |
| ||||||||||
moodle: unintended Dropbox access
| Package(s): | moodle | CVE #(s): | CVE-2012-5471 | ||||||||
| Created: | November 28, 2012 | Updated: | November 28, 2012 | ||||||||
| Description: | From the CVE entry:
The Dropbox Repository File Picker in Moodle 2.1.x before 2.1.9, 2.2.x before 2.2.6, and 2.3.x before 2.3.3 allows remote authenticated users to access the Dropbox of a different user by leveraging an unattended workstation after a logout. | ||||||||||
| Alerts: |
| ||||||||||
pcp: insecure temporary file use
| Package(s): | pcp | CVE #(s): | CVE-2012-5530 | ||||||||||||
| Created: | November 23, 2012 | Updated: | November 28, 2012 | ||||||||||||
| Description: | From the Fedora advisory: A security flaw was found in the way Performance Co-Pilot (PCP), a framework and services to support system-level performance monitoring and performance management, performed management of its temporary files used by various services from the suite. A local attacker could use this flaw to conduct symbolic link attacks (alter or remove different system files, accessible with the privileges of the user running the PCP suite, than it was originally intended). | ||||||||||||||
| Alerts: |
| ||||||||||||||
perl-CGI: header injection
| Package(s): | perl-CGI | CVE #(s): | CVE-2012-5526 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Created: | November 28, 2012 | Updated: | December 19, 2012 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Description: | From the CVE entry:
CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Alerts: |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
rssh: command execution
| Package(s): | rssh | CVE #(s): | CVE-2012-2251 CVE-2012-2252 | ||||||||||||
| Created: | November 28, 2012 | Updated: | November 28, 2012 | ||||||||||||
| Description: | From the Debian advisory:
James Clawson discovered that rssh, a restricted shell for OpenSSH to be used with scp/sftp, rdist and cvs, was not correctly filtering command line options. This could be used to force the execution of a remote script and thus allow arbitrary command execution. | ||||||||||||||
| Alerts: |
| ||||||||||||||
tomcat: multiple vulnerabilities
| Package(s): | tomcat6 | CVE #(s): | CVE-2012-2733 CVE-2012-5885 CVE-2012-5886 CVE-2012-5887 CVE-2012-3439 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Created: | November 22, 2012 | Updated: | May 29, 2013 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Description: | From the Ubuntu advisory: It was discovered that the Apache Tomcat HTTP NIO connector incorrectly handled header data. A remote attacker could cause a denial of service by sending requests with a large amount of header data. (CVE-2012-2733) It was discovered that Apache Tomcat incorrectly handled DIGEST authentication. A remote attacker could possibly use these flaws to perform a replay attack and bypass authentication. (CVE-2012-5885, CVE-2012-5886, CVE-2012-5887) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Alerts: |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
unity-firefox-extension: code execution
| Package(s): | unity-firefox-extension | CVE #(s): | CVE-2012-0960 | ||||
| Created: | November 22, 2012 | Updated: | November 28, 2012 | ||||
| Description: | From the Ubuntu advisory: It was discovered that unity-firefox-extension incorrectly handled certain callbacks. A remote attacker could use this issue to cause unity-firefox-extension to crash, resulting in a denial of service, or possibly execute arbitrary code. | ||||||
| Alerts: |
| ||||||
vlc: denial of service
| Package(s): | vlc | CVE #(s): | CVE-2012-5470 | ||||||||
| Created: | November 22, 2012 | Updated: | November 28, 2012 | ||||||||
| Description: | From the Mageia advisory: libpng_plugin in VideoLAN VLC media player 2.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted PNG file (CVE-2012-5470). | ||||||||||
| Alerts: |
| ||||||||||
weechat: shell injection
| Package(s): | weechat | CVE #(s): | CVE-2012-5534 | ||||||||||||||||||||||||||||||||||||||||
| Created: | November 28, 2012 | Updated: | December 3, 2012 | ||||||||||||||||||||||||||||||||||||||||
| Description: | From the openSUSE advisory:
added weechat-fix-hook_process-shell-injection.patch which fixes a shell injection vulnerability in the hook_process function (bnc#790217, CVE-2012-5534) | ||||||||||||||||||||||||||||||||||||||||||
| Alerts: |
| ||||||||||||||||||||||||||||||||||||||||||
Page editor: Jake Edge
Next page:
Kernel development>>
