back to article Mozilla security chief confirms data leakage bug in Firefox

Mozilla's chief of security has confirmed a vulnerability that could cause fully patched versions of Firefox to expose a user's private data. The confirmation, which was posted here by Mozilla's Window Snyder, follows the release of proof-of-concept code by researcher Gerry Eisenhaur. The bug resides in Firefox's chrome …

COMMENTS

This topic is closed for new posts.
  1. Anonymous Coward
    Alert

    Firefox users and security

    Oh come on!! Anyone who uses firefox is going to have at least some knowledge of security!

    As for adding an attacking website to your list of trusted sites, that a complete no brainer!!

  2. Anonymous Coward
    Thumb Up

    Download Statusbar fixed

    Download Statusbar extension fixed on 22/01:

    Version 0.9.5.3 - January 22, 2008

    Created .jar file structure to prevent security issues created by Firefox bug #413250

  3. Greg

    At least with Firefox...

    ...you know that patch will be here sooner rather than later. :-)

  4. Giorgio Maone

    NoScript Protection Works Anyway

    NoScript users are protected against exploitation of this bug anyway, no matter if the attacker site is on their trusted whitelist or not.

    See

    http://hackademix.net/2008/01/23/old-noscript-tricks-blocking-new-vulnerabilities/

    for details.

  5. Anonymous Coward
    Dead Vulture

    @Firefox users and security

    Firefox is designed to be used by new users and non techy users.

    Have you spent more than 2 seconds with non techy users?

    Knowledge of security ROFL!

  6. TrishaD
    Paris Hilton

    @Firefox users and security

    'Anyone who uses firefox is going to have at least some knowledge of security!'

    And of course anyone who uses IE is a braindead untermensch who deserves to be hacked for financing Mr Gates' evil empire......

    Firefox has become increasingly popular with non-technical users (I know several) and its popularity means that its increasingly open to scrutiny in terms of vulnerability....

    Could we perhaps cease the knee-jerk 'MS bad. Firefox/Linux/Apple good' litanies that seem so prevalent on here and accept the fact that popular systems get hacked?

    And for that matter, could we cease the smug, persistent myth that all end users are cretins? Just because you dont possess the complete works of Douglas Adams doesnt make you an idiot........

    (Paris invoked here because I have a sneaking suspicion that she might not be as stupid as she looks either.....)

  7. yet another Matt
    Unhappy

    Browser Transversal

    When IE goes wrong you say 'use Firefox'. When Firefox goes wrong you say 'use NoScript'. Where is the Opera love?

    Although, I can see a point where there will be an article saying 'Firefox and Opera are broke, use IE'.

    Then again... maybe not.

  8. Sam

    @ Greg

    Probably some time tomorrow.

  9. Anonymous Coward
    Flame

    @Firefox users and security

    "Oh come on!! Anyone who uses firefox is going to have at least some knowledge of security!"

    Troll.

  10. Anonymous Coward
    Anonymous Coward

    It's not so cut and dried

    "As for adding an attacking website to your list of trusted sites, that a complete no brainer!!"

    Not that simple though. If I visit a 'complex' site with NoScript running it can end up blocking several hosts and the site is completely broken. So you have to work out which hosts are important to make it work again. There's no simple way (yet) of knowing whether you can trust an individual host, so you still end up trusting them anyway or else your site remains broken.

    It requires a fair bit of research to find out what each host gets up to. I bet most people running NoScript have unknown hosts which were trusted because the main site was trusted. That still leaves you open to malpractice by embedded content, which is on the increase.

    So in a sense NoScript can only protect you in the same way that leaving your computer switched off can protect you. Anything else requires user decisions and research and is prone to error and misdirection like anything else.

  11. Anonymous Coward
    Coat

    Window Snyder

    Is this really his name ? Window ? Good job his surname wasn't "Cleaner", or "Fitter", or "Pane".

  12. DJGM
    Boffin

    What about . . .

    . . . other Mozilla based apps possibly being affected, such as SeaMonkey?

  13. Giorgio Maone

    @Chris: NoScript doesn't require any user decision in this case

    If you read my first comment, you'd know this specific chrome script protection is independent from your whitelist, i.e. it applies to every site no matter if JavaScript is enabled or not (opposite to what Dan's article suggests).

    @DJGM:

    yes, it applies to SeaMonkey as well.

  14. Pat Ar
    Heart

    Window S.

    Yes, that is her real name. She is Mozilla's Chief Security Officer with the actual job title, "Chief Security Something" She came from security at M$. Here is a C/net piece on her.

    http://earthlink.com.com/Mozilla+looks+to+Microsoft+for+security/2008-7355_3-6117896.html

  15. Anonymous Coward
    Coat

    Re: Window S

    She came from M$ and her name is Window ? so that operating system is really hers ?!!

  16. Anonymous Coward
    Anonymous Coward

    To Giorgio Maone

    I agree and I use it, I was just responding to the general statement "As for adding an attacking website to your list of trusted sites, that a complete no brainer!!"

  17. BitTwister

    @TrishaD

    > its popularity means that its increasingly open to scrutiny in terms of vulnerability....

    Vulnerabilities are not dependent on the number of users, and as the source code has been freely available for download since day one you'd think this would be a more efficient method of being "open to scrutiny". Yet still FF remains more secure, quite likely *because* it is open to scrutiny.

  18. Mike Lovell
    Flame

    @BitTwister

    "Vulnerabilities are not dependent on the number of users, and as the source code has been freely available for download since day one you'd think this would be a more efficient method of being "open to scrutiny". Yet still FF remains more secure, quite likely *because* it is open to scrutiny."

    Hang on a second, didn't we recently have a report that in fact more vulnerabilities were found in FF over the same period of time than IE.

    Of course then all the FF fanbois at our place started saying "Well, that just means they're better at finding exploits" ... Of course they wouldn't recognise such an argument if I made it about Windows!

    Like arguing with a brick wall.

  19. Liam O'Flaherty
    Joke

    What about...

    Window Licker?

  20. BitTwister

    @Mike Lovell

    > more vulnerabilities were found in FF over the same period of time than IE.

    Yeah, right - and like all Microsoft apologists you attempt to reduce the real issues down to a childishly simplistic 'vulnerability count'. If your 'method' had any validity or meaning then FF would be as vulnerable (or worse) than IE - yet *still* it isn't.

This topic is closed for new posts.

Other stories you might like

Biting the hand that feeds IT © 1998–2022