Hackers claim zero-day flaw in Firefox

Questions, guidance and discussion

Moderator: Angry Angel

Post Reply
Message
Author
User avatar
HopefulNebula
Posts: 504
Joined: October 17th, 2004, 6:42 pm
Location: Sandwiched between Hippieville and Neoconland.
Contact:

Hackers claim zero-day flaw in Firefox

#1 Post by HopefulNebula » October 2nd, 2006, 6:28 pm

http://news.com.com/Hackers+claim+zero- ... 21608.html

SAN DIEGO--The open-source Firefox Web browser is critically flawed in the way it handles JavaScript, two hackers said Saturday afternoon.

An attacker could commandeer a computer running the browser simply by crafting a Web page that contains some malicious JavaScript code, Mischa Spiegelmock and Andrew Wbeelsoi said in a presentation at the ToorCon hacker conference here. The flaw affects Firefox on Windows, Apple Computer's Mac OS X and Linux, they said.

"Internet Explorer, everybody knows, is not very secure. But Firefox is also fairly insecure," said Spiegelmock, who in everyday life works at blog company SixApart. He detailed the flaw, showing a slide that displayed key parts of the attack code needed to exploit it.

The flaw is specific to Firefox's implementation of JavaScript, a 10-year-old scripting language widely used on the Web. In particular, various programming tricks can cause a stack overflow error, Spiegelmock said. The implementation is a "complete mess," he said. "It is impossible to patch."

The JavaScript issue appears to be a real vulnerability, Window Snyder, Mozilla's security chief, said after watching a video of the presentation Saturday night. "What they are describing might be a variation on an old attack," she said. "We're going to do some investigating."

Snyder said she isn't happy with the disclosure and release of an apparent exploit during the presentation. "It looks like they had enough information in their slide for an attacker to reproduce it," she said. "I think it is unfortunate because it puts users at risk, but that seems to be their goal."

At the same time, the presentation probably gives Mozilla enough data to fix the apparent flaw, Snyder said. However, because the possible flaw appears to be in the part of the browser that deals with JavaScript, addressing it might be tougher than the average patch, she added. "If it is in the JavaScript Virtual Machine, it is not going to be a quick fix," Snyder said.

The hackers claim they know of about 30 unpatched Firefox flaws. They don't plan to disclose them, instead holding onto the bugs.

Jesse Ruderman, a Mozilla security staffer, attended the presentation and was called up on the stage with the two hackers. He attempted to persuade the presenters to responsibly disclose flaws via Mozilla's bug bounty program instead of using them for malicious purposes such as creating networks of hijacked PCs, called botnets.

"I do hope you guys change your minds and decide to report the holes to us and take away $500 per vulnerability instead of using them for botnets," Ruderman said.

The two hackers laughed off the comment. "It is a double-edged sword, but what we're doing is really for the greater good of the Internet. We're setting up communication networks for black hats," Wbeelsoi said.


Yippeee. Safari for me for a while, I guess. I hope they fix this up in 2.0. (My bet is, they delay its release until they fix it, but *naturally* these people who are *so hung up on* security aren't gonna... you know... do anything useful.

(edited to snip extraneous stuff I'd copypasted)
Last edited by HopefulNebula on October 2nd, 2006, 8:09 pm, edited 1 time in total.
Nebby@Dreamwidth - Nebby@Twitter

Quote of the Whenever:

"Oh, great. I come back from the dead and first thing I see is an iPod trying to kill me."

User avatar
Santaman
Administrators
Posts: 44021
Joined: October 17th, 2004, 2:14 am
Location: That ship

#2 Post by Santaman » October 2nd, 2006, 6:34 pm

Back to IE then I guess. :lol:
""Revenge is a dish best served fried... deep fried!" (Alestorm)" (Alestorm.)
Cutthroat Coffee, The Pirate's Choice!

User avatar
HopefulNebula
Posts: 504
Joined: October 17th, 2004, 6:42 pm
Location: Sandwiched between Hippieville and Neoconland.
Contact:

#3 Post by HopefulNebula » October 2nd, 2006, 8:07 pm

Heh.

Also, Mischa Spiegelmock is an employee of SixApart.
Nebby@Dreamwidth - Nebby@Twitter

Quote of the Whenever:

"Oh, great. I come back from the dead and first thing I see is an iPod trying to kill me."

User avatar
Teelie
Posts: 459
Joined: October 17th, 2004, 7:23 am

#4 Post by Teelie » October 4th, 2006, 4:20 am

I use NoScript. Problem solved. :nyah:

User avatar
HopefulNebula
Posts: 504
Joined: October 17th, 2004, 6:42 pm
Location: Sandwiched between Hippieville and Neoconland.
Contact:

#5 Post by HopefulNebula » October 4th, 2006, 5:15 am

Oooh, good catch. Especially since I just couldn't stay with Safari. No drag-and-drop tab reordering, no middle-click to close, no way (at least that was apparent) to have a "home page" be multiple tabs...
Nebby@Dreamwidth - Nebby@Twitter

Quote of the Whenever:

"Oh, great. I come back from the dead and first thing I see is an iPod trying to kill me."

User avatar
Rocketman
Technical guru
Posts: 428
Joined: October 17th, 2004, 1:42 am
Location: The good land

#6 Post by Rocketman » October 4th, 2006, 4:48 pm

Teelie wrote:I use NoScript. Problem solved. :nyah:


Wouldn't be that sure. Firefox uses Javascript for everything. Extensions are written in it, for example.

User avatar
Teelie
Posts: 459
Joined: October 17th, 2004, 7:23 am

#7 Post by Teelie » October 4th, 2006, 11:10 pm

Yeah, but in order for this to work, it has to be executed from a specially crafted page and since I don't enable javascript on pages I don't trust, the chances are lower of it being able to pull off the exploit. Some protection is better than no protection.

User avatar
Teelie
Posts: 459
Joined: October 17th, 2004, 7:23 am

#8 Post by Teelie » October 9th, 2006, 8:40 pm

Turns out it was a hoax.

One of the speakers at a Toorcon security conference session last weekend has admitted that claims he and an accomplice made regarding an "unfixable" flaw in Firefox, and a video of the two purportedly exploiting this flaw, were a not-so-elaborate hoax.

"The main purpose of our talk was to be humorous," admitted Mischa Spiegelmock, in a statement made through Mozilla.org this afternoon.

"As part of our talk we mentioned that there was a previously known Firefox vulnerability that could result in a stack overflow ending up in remote code execution. However, the code we presented did not in fact do this, and I personally have not gotten it to result in code execution, nor do I know of anyone who has.

"I have not succeeded in making this code do anything more than cause a crash and eat up system resources, and I certainly haven't used it to take over anyone else's computer and execute arbitrary code," Spiegelmock added.

A Mozilla spokesperson told BetaNews this afternoon, "Mozilla takes painstaking measures to maintain the security of Firefox, and immediately started investigating these reports these past weekend." The company's security chief, Window Snyder, posted a statement saying the company will continue to investigate further, assuming there's actually anything that needs to be investigated.

In an attempt to distance himself from his colleague, Andrew Wbeelsoi, Spiegelmock added today, "I do not have 30 undisclosed Firefox vulnerabilities, nor did I ever make this claim. I have no undisclosed Firefox vulnerabilities. The person who was speaking with me made this claim, and I honestly have no idea if he has them or not." Evidently, the two did not coordinate their stories prior to their San Diego performance, let alone afterward.

Wbeelsoi's bio for the Toorcon session states that he "ruins things on the Internet professionally." There may be partial truth, at least, in that.

"I apologize to everyone involved," Spiegelmock closed, "and I hope I have made everything as clear as possible."

Post Reply