Mozilla Firefox 18.104.22.168 Released
Tuesday July 31st, 2007
Mozilla Firefox 22.214.171.124 has been released. This browser upgrade fixes two security flaws, which are detailed in the Firefox 126.96.36.199 section of the Mozilla Foundation Security Advisories page.
The more serious flaw involves Firefox not percent-encoding spaces and double quotes in URLs passed to helper applications, which can allow malicious webpages to open programs with potentially dangerous command line parameters. The other vulnerability is a privilege elevation bug involving extensions, which was accidentally introduced in Firefox 188.8.131.52.
The URL protocol handling flaw is a similar class of exploit to the firefoxurl:// URL vulnerability, which was fixed with the release of Firefox 184.108.40.206. In the original firefoxurl:// exploit, an attacker could use Microsoft Internet Explorer to launch Firefox with malicious command line parameters. In the flaw fixed in Firefox 220.127.116.11, Firefox is used as the attack vector to start other applications with dangerous arguments. The exploit could be extended to execute any program in a known location, possibly passing dangerous command line parameters.
Whether or not it's Firefox's responsibility to ensure that data passed to external applications is (relatively) safe is a matter for debate. When the original firefoxurl:// URL vulnerability was discovered, Microsoft claimed that IE was not at fault. However, as Mozilla maintained at the time that the blame lay with IE, it would have been hypocritical not to fix the similar issue in Firefox. The Mozilla Security Blog post about the URL protocol handling flaw states that "defense in depth is the best way to protect people" (although that weblog post says that only Windows is affected, discussion in bug 389106 indicates that Linux and Mac OS X may also be vulnerable).
Firefox prompts the user before launching most helper applications and shows the command line parameters, so users of vulnerable versions would receive some warning of an attack (though only the savvy are likely be knowledgeable enough to distinguish between safe and malicious command lines). However, some protocols related to email and newsgroups (specifically, mailto, news, nntp and snews) do not prompt the user before launching an external application, so vulnerable mail and newsgroups applications could be exploited with minimal user intervention (Thunderbird 18.104.22.168 and earlier is one such application, due to its variant of the firefoxurl:// problem).
More details about Firefox 22.214.171.124 can be found in the Firefox 126.96.36.199 Release Notes. The new version can be downloaded from the Firefox 188.8.131.52 product page. Existing Firefox 2 users with the software update feature enabled (it's on by default) will be prompted to upgrade. Equivalent releases of Thunderbird (both 2 and 1.5) and SeaMonkey are expected soon.
#4 The vital issue here
by mhenriday <firstname.lastname@example.org>
Wednesday August 1st, 2007 9:49 AM
You are replying to this message
is user protection, not spin and blame games. Thus, to the extent that she is correct in stating that «[o]ur reason for fixing it then was not to avoid the appearance of hypocrisy, but because it's the right thing to do to protect users», asa certainly has got her priorities right, as does Mozilla. Keep up the good work - it's highly appreciated !...