|
|
Mozilla to Fix 'Minor' Firefox Bug Elizabeth Montalbano, IDG News Service
Fri Dec 9,11:00 AM ET
The first Firefox 1.5 security vulnerability, made public Thursday, is not as critical as initially perceived, but a patch will be available to fix it early next year, a Mozilla executive says.
ADVERTISEMENT
Mozilla plans to repair the hole in the latest version of its open-source browser when it releases its next regularly scheduled stability build of Firefox. That should happen in late January or early February, said Mike Schroepfer, vice president of engineering for Mozilla. Firefox 1.5 was released November 30.
"Based on the information we have, it's a low-severity issue, but we will address it anyway," he said in an interview Thursday.
Researchers Describe Glitch
Packet Storm Security on Wednesday released code that takes advantage of the vulnerability, which can cause a buffer overflow and put users at risk of a denial of service attack when running the browser, according to a posting Thursday by independent security consultant John Bambenek on the SANS Internet Storm Center Web site.
According to the posting, the vulnerability is in the browser's history.dat file, which stores a user's history of Web sites visited. It can be exploited by crafting an abnormally long URL with perhaps a few million characters. If a user navigates to a site that exploits the hole, "it will crash the browser each time it is started after going to such a page," Bambenek wrote in the posting.
Security research company Secunia Thursday gave the bug a rating of "not critical" in a report on its Web site.
Problem Rare, Mozilla Says
Schroepfer said a team of volunteers and Mozilla engineers never discovered a denial-of-service problem using the proof of concept code from Packetstorm.
"We have no independent confirmation that it crashes, not for lack of trying," he said.
Schroepfer said that when engineers tried to recreate the problem, the browser worked sluggishly and took an exceptionally long time to load a Web page, but only after the browser was closed and then restarted after the first security breach. However, the browser will not crash.
"Eventually, it will process and will start properly," he said.
Furthermore, Schroepfer said it would be extremely rare for someone to visit a site that exploits the hole during a typical Web-browsing session.
"You'd have to browse to a malicious site, one that someone spent the time to create to cause people harm," he said. "Then you'd have to browse there, and the next time your browser would take longer to start."
Even if a user does encounter a malicious Web site that exploits the hole, clearing out the browser's history will remedy the problem, Schroepfer added.
-- PC World Online |
|
|