No need for NoScript (it's a nice extension though)
It should be sufficient to set all the network.protocol-handler.warn-external.* variables to true in about:config.
Security researchers have disclosed a zero-day vulnerability in the latest version of Firefox that gives miscreants complete control of Windows-based computers when the Mozilla browser visits a booby-trapped website. The vulnerability resides in the way Firefox handles uniform resource identifiers, the protocols that allow the …
This URI problem is a result of the OS being unable to handle/sanitize requests properly. Letting any application (bugs and all) register itself as an arbitrary URI handler is kind of wacky at best. It's doubly dangerous because it happens without notifying the user.
Please make it clear that this "Firefox problem" doesn't happen on any OS other than MS Windows. Then we can correctly judge if the application or the OS is to blame.
The first poster is correct; I tested the exploit on the site mentioned in the article and it did indeed operate as stated. When I went into about:config and set all of the network.protocol-handler.warn-external values to true (all but the first are false by default) and returned to the test site, Firefox issued a warning after clicking on the test links. Of course, if you ignore the warning and click OK anyway, then you still get attacked, but it does work as stated by the first poster and gives you a chance to abort the process.
I noticed that these exploits work by launching an application that's already installed on your machine (in the case of the test site, Windows calculator is launched through a command console), so this exploit could only really work if your machine has already been compromised by malware.
Running IE is already a security risk akin to driving over the speed limit sans safety belts, your eyes closed, & facing the wrong way in the seat.
Even if you decide to run IE in a SandBox, (a virtual environment designed to stop malware's ability to infect the system it's being run on), the malware is being programed to figure out it's being run in one & actively defeat said security measures.
Just do yourself a favour - install FireFox & the NoScript extension.
There's no SandBox for them to defeat, because your system never runs them in the first place.
So it comes as NO surprise that the Editors had to DISable the NoScript functionality in order to verify that the demo links did as they claimed - NoScript refused to let the exploits run until they turned NoScript off!
How much more proof of the security & viability of FF+NS do you need?
"Mozilla's security team is aware of the flaw, which was reported on the Billy (BK) Rios blog, and is working on a patch, a spokesman for the open-source organization said."
Strange that it is not considered as a facility which works on any and all OS? Don Pedro is not right to think that it can be OS specific whenever it is OS agnostic....... for that would be to think that it is limited in what IT can do, rather than Enabled in an Enlightened and Enlightening Space.
And the added subtlety whenever the URI is both Uniform and Universal ensures that it is so versatile.
And it is very misleading to assume and state that just because it triggers "interest" in a resource that can compromise systems that it is malware, for an Intelligently Designed packet of Information/Code/MetaData will merely explore exploitation of the malconfigurations which have been stealthily programmed into the OS from its very inception/before even its conception as well as tinkering with the vulnerable elements supplied by third party use and abuse.
And that makes it much more the Virtual Scenario White Knight galloping 42 Slay the Dragon than a wicked Uncle Ernie delving below the sheets to fiddle about. And those daring Dan Dare MiSISions are always going to be as 42 Rescue the Damsel in Distress......with ITs Total Addiction to her Gratification as AIReward.
Man has no Defence against such Attacks ....and neither do his Computerised Systems........ but all that they do, is to Prompt Internal Reconfiguration..... Self Healing via Virtual Means/MetaData Flows.
Per Ardua ad MetaAstra....Een Team, een Taak.
If it is the responsibility of the receiving application to validate all incoming data (Microsoft's argument for passing the buck for IE infecting Firefox) then
(1) Are developers to also assume that Windows XP/Windows Vista et al are alien "applications" that cannot be trusted? No, the Developer would not be able to effectvely write programs if that were the case. Every call to the OS to obtain a handle of some sort would need to be called in two ways to make sure there's no Rootkit issues. OK, now cast your mind back. Didn't Microsoft once say that IE was an integral part of the OS that couldn't be removed? So where does the developer draw the line?
(2) If Firefox were to pass something dodgy back to the OS, then surely the OS has to also accept a similar responsibility? In other words, shouldn't the OS do similar validation checks?
The answer really should be that a computer OS should be designed in a heirarchical way. The responsibility for security should lie solely with the OS - the OS cannot expect any app to be 100% legit because these apps are written by third-parties who may have unethical intentions. I say "should". Unfortunately it is anything but true, and this is why we are in the mess we are in today.
Want a simple, generic solution to this problem?
NEVER browse the Internet under Windows with anything more than basic user privileges, especially when logged in with Admin proviledges. Targeting just the specific processes of high risk applications such as IE and Firefox so that they run under the security-equvalent of a limited user will SIGNIFICANTLY reduce the attack surface for all kinds of (un)known exploits, including this one.
For more info, see the blog by Michael Howard. http://blogs.msdn.com/michael_howard/archive/2005/01/31/363985.aspx
The principle applies to any Internet-enabled application including IE, Firefox, Acrobat, Media Player, Quicktime, ITunes etc. The joy is that even with this added level of protection, you can still be logged on as an administrator and perform other tasks as normal.
A "Zero day flaw" what exactly do you mean by this apart from getting a threating headline?
A zero-day exploit, fair enough - that's an exploit that's in the wild that is using a previously unknown security flaw.
This has been discovered by researchers, communicated to the developers and a work-around is available. There's nothing zero day about this.
I make no secret of the fact that I dislike IE and consider using it to be a security risk. This is, however, one time when I kind of agree with MS.
When I was taught to code one of the pearls of wisdom I was given was "Never trust input data you didn't generate yourself, errors happen, always check it." This seems like common sense to me, particularly when external programs can get version upgrades which may change their behaviour from the version you developed against.
Mozilla was born from a group of people who probably didn't like IE very much and I'm sure would probably tell you how bad it is if you asked. That being true if Mozilla put their code on Windows and chose to accept input from every program under the sun without validating it then, even though those programs should behave better, I consider it Mozilla's fault. Come on guys, you're better than that. Bullet-proof your code.
Strange, while a host of blocked Java scripts show up on The Register's site, landing on xs-sniper.com does not show any scripts active. Can click on the proof of concept link eg the news one and it gets as far as launching Outlook Express - then maybe it seems to fail due to a "Not Recognized Format" error.
There's not a week goes by without yet another Firefox security chasm being discovered. It's no different to IE at the end of the day.
Let's see how secure Firefox 1.00 still is on the web in 10 years time. If it was as secure as they said it was, it would just lack new features rather than be unsafe, right?
You sound like an idiot who has no clue about security or worse a Microsoft shrill.
Proper security is a evolving _process_ based on many layers e.g. NoScript is a security layer which all Firefox users should have, restricted accounts, anti-virus, firewalls and NAT routers are other layers.
Don't expect applications to be 100% secure on their own, especially complex, interactive, pluggable software like browsers, which can be quite tough to secure, especially fatally insecure crud like IE!
Mozilla and the authors of security plugins like NoScript and Adblock are doing a far better job overall than Opera and Microsoft, and tend to fix issues very quickly!
A lot of these new security issues are being aggressively searched for by very smart security professionals, to make honest money and reputation, better they find them and force a fix before criminals find them and wreck your machine!
In response to the person above who unfortunately had to withhold their name, it's all very simple. If it's secure, it's secure. If Fire Fox 1.00 was as safe as they claimed then it would be perfectly safe to use in 10 years time. It may lack new features and there may be holes in the underlying operating system that are patched along the way, but there shouldn't be holes in the browser itself that render it unsafe. I say this only because of the great hype generated by Mozzila about security - live by the sword, die by the sword, and all that.
Fire Fox 1.00 is, of course, already very unsafe and it was only out a couple of years ago. And Opera and Safari have much better track records in security than Fire Fox and IE, it's a statistical fact (just browse the stats on the Secunia website) that can only be overcome by the religious fervour of fanbois. Another fact is that Mozzila made fun of the 'patch' system IE uses and released complete versions until of course they rocketed through 1.0.xx releases due to regular security holes being discovered. Then they switched to the patch system which they said was 'an improvement', since which the number of security holes and patches continues to climb through double figures.
But, them's all just browsers and it's the weekend, so chill. Though understand that when someone stands up and claims to be the worlds most intelegent person and then starts to get the pub quiz questions wrong, they're going to get more stick than those who just did their best...
Biting the hand that feeds IT © 1998–2021