Updated: Using firefox v1.0.3? Time to disable javascript.

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Uh oh!

Mozilla Firefox 1.0.3 Remote Arbitrary Code Execution Exploit
Date : 07/05/2005

FrSIRT Comment - This is a 0day exploit/vulnerability (unpatched).
This code will download/execute a malware without user interaction.

Rated as : Critical
Solution : Disable Javascript

EDIT: See CTho9305's post.
 

CTho9305

Elite Member
Jul 26, 2000
9,214
1
81
The holes being exploited exist in both Firefox and Mozilla. However, remote code execution (the most critical issue) requires that the attacker can get you to load a trusted page. Mozilla, by default, ships with an empty whitelist (i.e. it trusts nothing); Firefox ships with a whitelist that trusts Mozilla Update. On Saturday, we made changes to the Mozilla Update website which stopped all published exploits we could find. The published exploits depended on certain Mozilla Update functionality which we changed. On Sunday, we made more drastic changes to move Mozilla Update to an untrusted domain; when an attacker now attempts to use the security hole to run code with Mozilla Update's permissions, it runs as an untrusted page, and thus is blocked.

Long story short:
1. published exploits no longer work
2. simple modifications to published exploits will no longer work (as far as I know, remote code execution shouldn't be possible any more on a default Firefox install)
3. remote code execution requires that you have sites in your whitelist, and have software install enabled (it is enabled by default). Our modifications to Mozilla Update mean it is effectively not on your whitelist, so a default Firefox install now effectively has an empty whitelist.
4. there is still a way to exploit the security hole to steal cookies; disabling javascript may be the only way to prevent this (however, I consider cookie-stealing signficantly less severe).
 

jadinolf

Lifer
Oct 12, 1999
20,952
3
81
Originally posted by: CTho9305
Yeah, the a$$hat 0-day'd publically. AFAIK, he gave the devs no warning. Great way to get lots of people hacked.

Disabling software installation apparently also fixes the problem, and results in a significantly more useful browser.

edit: Oh, and at this point it looks like the Mozilla Suite is not affected.

Good news because I use Mozilla. :D
 

TekDemon

Platinum Member
Mar 12, 2001
2,296
1
81
lol yeah I found it odd that I was being asked to patch to 1.03 again when I already patched to 1.03 yesterday. Oh well at least I'm patched
 

Megatomic

Lifer
Nov 9, 2000
20,127
6
81
See, and as FF popularity rises so will the number of reported exploits. Hackers always look for the biggest bang for the buck, just like everyone else.
 

rh71

No Lifer
Aug 28, 2001
52,844
1,049
126
Originally posted by: Megatomic
See, and as FF popularity rises so will the number of reported exploits. Hackers always look for the biggest bang for the buck, just like everyone else.
Whoever didn't realize this is a FF fanboi fool. ;)
 

Snapster

Diamond Member
Oct 14, 2001
3,916
0
0
Originally posted by: rh71
Originally posted by: Megatomic
See, and as FF popularity rises so will the number of reported exploits. Hackers always look for the biggest bang for the buck, just like everyone else.
Whoever didn't realize this is a FF fanboi fool. ;)

And there's plenty of those about. :p Next they'll be saying long as you are 'up to date' you'll be secure. ;)
 

rh71

No Lifer
Aug 28, 2001
52,844
1,049
126
Originally posted by: CTho9305
Disabling software installation apparently also fixes the problem, and results in a significantly more useful browser.
source ? Hope it's true. I can't browse without JS... I may as well not browse at all...
 

CTho9305

Elite Member
Jul 26, 2000
9,214
1
81
Originally posted by: tami
is there a decent DOWNLOADABLE patch for this flaw?

Not yet. However, this morning, we (some Mozilla Update & Mozilla developers) realized there may be a way to completely prevent the hole from being exploitable, and have been working on it for most of the day.
 

CTho9305

Elite Member
Jul 26, 2000
9,214
1
81
Originally posted by: rh71
Originally posted by: CTho9305
New fix is live :)
Fix ? Where ? I still see it labeled as 1.0.3 on mozilla.org still...

We mitigated the exploit by making changes to Mozilla Update. The exploit depended on the elevated privileges of whitelisted sites (Mozilla Update is whitelisted by default), so we did some work to stop that. The exploit now runs only with normal privileges, so Firefox blocks it. See also Mozilla Update.
 

tami

Lifer
Nov 14, 2004
11,588
3
81
i don't see the update anywhere either...

although i appreciate your work, ctho!
 

rh71

No Lifer
Aug 28, 2001
52,844
1,049
126
Originally posted by: CTho9305
Originally posted by: rh71
Originally posted by: CTho9305
New fix is live :)
Fix ? Where ? I still see it labeled as 1.0.3 on mozilla.org still...

We mitigated the exploit by making changes to Mozilla Update. The exploit depended on the elevated privileges of whitelisted sites (Mozilla Update is whitelisted by default), so we did some work to stop that. The exploit now runs only with normal privileges, so Firefox blocks it. See also Mozilla Update.
Thanks, but in plain English, what do I need to do to patch up ? Don't see anything I can use on that site either. This is a client-side problem, still, no ?
 

Zugzwang152

Lifer
Oct 30, 2001
12,134
1
0
Originally posted by: aplefka
Originally posted by: jadinolf
Originally posted by: Zugzwang152
well thank goodness i use IE.

Yep, nothing like using a perfectly secure browser.

:laugh:

Pwned.

how is that owned? I really don't give two sh|ts about all this security mumbo jumbo. A good number of sites are programmed towards IE compatibility, and until that changes, neither will I. i've never once had any sort of spyware on my computer, and i don't plan on getting any in the future. I stick to legitimate websites, hell i don't even get popups on most places I visit. You can call pwned on all the idiots with spyware infested computers, not me.
 

CTho9305

Elite Member
Jul 26, 2000
9,214
1
81
Originally posted by: rh71
Originally posted by: CTho9305
Originally posted by: rh71
Originally posted by: CTho9305
New fix is live :)
Fix ? Where ? I still see it labeled as 1.0.3 on mozilla.org still...

We mitigated the exploit by making changes to Mozilla Update. The exploit depended on the elevated privileges of whitelisted sites (Mozilla Update is whitelisted by default), so we did some work to stop that. The exploit now runs only with normal privileges, so Firefox blocks it. See also Mozilla Update.
Thanks, but in plain English, what do I need to do to patch up ? Don't see anything I can use on that site either. This is a client-side problem, still, no ?

The hole is client-side. Fully exploiting the hole requires that the attacker can get you to load a trusted page - what the published exploits do is load Mozilla Update in an <iframe>. By moving Mozilla Update to an untrusted domain, we effectively nullified the default whitelist (which only contains Mozilla Update) - now no trusted pages exist. If you still have a popular site like extensionsmirror.nl whitelisted, you should remove that.

Note that apparently there is also a way to steal cookies, which can only be stopped by disabling javascript.
 

rh71

No Lifer
Aug 28, 2001
52,844
1,049
126
So you guys are continuing to work on the javascript exploit, correct ? Can't surf effectively without JS...
 

rh71

No Lifer
Aug 28, 2001
52,844
1,049
126
Originally posted by: n0cmonkey
Turn off that software installation crap: *solved* :p
not according to this:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Mozilla Foundation Security Advisory 2005-42
Title: Code execution via javascript: IconURL
Severity: Critical
Reporter: Paul (Greyhats)
Products: Firefox, Mozilla Suite

Description
Two vulnerabilities were found in Mozilla Firefox that combined allow an attacker to run arbitrary
code. The Mozilla Suite is only partially vulnerable.

By causing a frame to navigate back to a previous javascript: url an attacker can inject script into
any site. This could be used to steal cookies or sensitive data from that site, or to perform actions
on behalf of that user. (Affects Firefox and the Suite).

A separate vulnerability in the Firefox install confirmation dialog allows an attacker to execute
arbitrary code by using a javascript: URL as the package icon. By default only the Mozilla Foundation
update site is allowed to bring up this dialog, but the script injection vulnerability described above
enables this to be exploited from any malicious site.

The Mozilla Foundation has modified the update servers to prevent their use in this attack, but this
is only partial protection.

Workaround
Disable Javascript. Software updates can be disabled, but that protects only against the second issue
and not the first.


References
https://bugzilla.mozilla.org/show_bug.cgi?id=293302
(originally https://bugzilla.mozilla.org/show_bug.cgi?id=292691)