Vulnerability in FireFox 3.5.1 confirmed, exploit PoC, no patch

Published: 2009-07-18. Last Updated: 2009-07-18 15:04:23 UTC
by Patrick Nolan (Version: 1)
5 comment(s)

Various analysts and sites have recently confirmed a vulnerability is present in FireFox 3.5.1 that has had exploit PoC released. When exploited, the vulnerability can lead to system compromise or induce a DOS. No Patch is available.

Mozilla Firefox 3.5 Unicode Data Remote Stack Buffer Overflow Vulnerability

CVE-2009-2479

Keywords:
5 comment(s)

Comments

Will no script act as a work around ?
eEye says "Note: Although Javascript access can be restricted with applications such as the NoScript Add-On, it may still be possible for the browser to be exploited if an untrusted website is loaded (with/without the consent of the user, for example, via XSS or compromised-whitelisted website)" and rates this as a Medium Risk, all other sites I checked rate this at their highest risk. HTH
eEye is ignorant or purposely misleading here: NoScript features the first and best client-side anti-XSS protection, therefore running JavaScript code from an untrusted website "without the consent of the user" is practically impossible...
Thanks for the comment on the FF anti-XSS protection Giorgio. FWIW, I do not interpret their work as ignorant or misleading, they're correct and probably the only analysts that point out to users how you might get exploited even with "applications such as" NoScript. Compromised "Whitelisted" websites deserve mentioning too, for those that rely heavily in "Trusted" options in browsers and apps like NoScript.
It is things like this that make me truly wish the Firekeeper add-on would get out of the experimental phase. It uses snort-like rules to analyze pages and look for questionable activity. http://firekeeper.mozdev.org/

Diary Archives