Site icon Secplicity – Security Simplified

Mozilla's Delayed Firefox 3.6.14 Update Corrects 11 Vulnerabilities

Summary:

Exposure:

Yesterday, Mozilla released a Firefox update fixing 11 (count based on CVE number) vulnerabilities in their popular multi-platform web browser. Mozilla rates most of these vulnerabilities as critical; meaning an attacker can leverage them to execute code and install software without user interaction beyond normal browsing. We summarize three of the most critical Firefox 3.6.13 vulnerabilities below:

Mozilla’s alert describes other critical vulnerabilities, many of which allow attackers to execute code simply by enticing you to a malicious web page. Visit Mozilla’s Known Vulnerabilities page for a complete list of the vulnerabilities that Firefox 3.6.14 fixes. On a related note, some of these vulnerabilities also affect Firefox 3.5.x. If you use 3.5.x, we recommend you move to 3.6.14 . However, if you must stay with 3.5.x, Mozilla has also released an update (3.5.17) for that legacy version as well.

As an aside, Mozilla originally intended to release this update earlier in February. However, they had to delay their release due to some hard to fix issues. Since this update contains fixes for outstanding issues, we recommend you download and install it as soon as you can.

Solution Path:

Mozilla has released Firefox 3.6.14 and 3.5.17, to correct these security vulnerabilities. If you use Firefox in your network, we recommend that you download and deploy version 3.6.14 as soon as possible. If, for some reason, you must remain with Firefox 3.5.x, make sure to upgrade to 3.5.17.

Note: The latest version of Firefox 3.6.x automatically informs you when a Firefox update is available. We highly recommend you keep this feature enabled so that Firefox receives its updates as soon as Mozilla releases them. To verify that you have Firefox configured to automatically check for updates, click Tools => Options => Advanced tab => Update tab. Make sure that “Firefox” is checked under “Automatically check for updates.” In this menu, you can configure Firefox to always download and install any update, or if you prefer, only to inform the user that an update exists.

As an aside, attackers cannot leverage many of these vulnerabilities without JavaScript. Disabling JavaScript by default is a good way to prevent many web-based vulnerabilities. If you use Firefox, we recommend you also install the NoScript extension, which will disable JavaScript (and other active scripts) by default.

For All Users:

This attack arrives as normal-looking HTTP traffic, which you must allow through your firewall if your network users need to access the World Wide Web. Therefore, the patches above are your best solution.

Status:

The Mozilla Foundation has released Firefox 3.6.14 to fix these vulnerabilities.

References:

This alert was researched and written by Corey Nachreiner, CISSP.

Exit mobile version