Site icon Secplicity – Security Simplified

Firefox 3.6.x Gets its First Security Update – Mozilla Also Releases Security Updates for Legacy Firefox

On 24 March, 2010, we alerted LiveSecurity subscribers about Firefox 3.6.2, which corrected ten security vulnerabilities. When we first released this alert, the Mozilla Foundation had only released an update for the 3.6.x branch of Firefox. They had not released updates for the 3.0.x or 3.5.x branches of Firefox.

Yesterday, the Mozilla Foundation released Firefox 3.5.9 and 3.0.19, which fix many of the same vulnerabilities that Firefox 3.6.2 corrected. You can read more about the vulnerabilities these versions fix in our original alert, or the following Firefox Known Vulnerabilities pages:

If you can, we strongly encourage you use the latest branch of Firefox, 3.6.x. If you use 3.6.x, you probably already updated to version 3.6.2 when we sent our original Firefox alert, and can ignore this update. However, if you chose to stick with Firefox 3.0.x or 3.5.x for some reason, you should download and install Mozilla’s latest updates:

For additional details about the original vulnerability, and as a convenient reference, we reproduce our original 24 March alert below. You can also find it in the LiveSecurity Latest Broadcasts archive.


Summary:

Exposure:

In late January, the Mozilla Foundation released a new branch of Firefox, version 3.6. This week, Mozilla released the first security update for Firefox 3.6, specifically version 3.6.2 (they did not release 3.6.1). This update fixes at least ten (count based on CVE number) vulnerabilities that affect the latest version of Firefox. Mozilla rates four of these vulnerabilities as critical, which they define as flaws that  attackers can leverage to execute code and install software; requiring no user interaction beyond normal browsing. We summarize the most critical Firefox 3.6.x vulnerabilities below:

Mozilla’s alert describes six more vulnerabilities, including Cross-Site Scripting (XSS) flaws, browser defacement flaws, and issues that could help a phisher in social engineering attacks. Visit Mozilla’s Known Vulnerabilities page for a complete list of the vulnerabilities that Firefox 3.6.2 fixes.

As an aside, attackers cannot leverage many of these vulnerabilities without JavaScript. Disabling JavaScript by default is a good way to prevent many web-based vulnerabilities. If you use Firefox, we recommend you also install the NoScript extension, which will disable Javascript (and other active scripts) by default.

Solution Path:

Mozilla has released Firefox 3.6.2, correcting these security vulnerabilities. If you use Firefox in your network, we recommend that you download and deploy version 3.6.2 as soon as possible. Mozilla strongly recommends 3.0.x and 3.5.x users upgrade to 3.6.x, and so do we. If you are using an older version of Firefox, we recommend you move to 3.6.x, as it contains new security features, such as its ability to detect out-of-date and potentially insecure plug-ins and extensions.

Note: The latest version of Firefox 3.6.x automatically informs you when a Firefox update is available. We highly recommend you keep this feature enabled so that Firefox receives its updates as soon as Mozilla releases them. To verify that you have Firefox configured to automatically check for updates, click Tools => Options => Advanced tab => Update tab. Make sure that “Firefox” is checked under “Automatically check for updates.” In this menu, you can configure Firefox to always download and install any update, or if you prefer, only to inform the user that an update exists.

For All Users:

Many of these attacks arrive as normal-looking HTTP traffic, which you must allow through your firewall if your network users need to access the World Wide Web. Therefore, the patches above are your best solution.

Status:

The Mozilla Foundation has released Firefox 3.6.2, fixing these security issues.

References:

Exit mobile version