Windows, Mac and Linux versions all have the vulnerability


Mozilla Corp. today downplayed a threat posed by the first vulnerability reported for Firefox 3.0, telling users that the risk is "minimal."

"There is no public exploit, the details are private, and so the risk to users is minimal," Window Snyder, Mozilla's chief security officer, said in an entry to a company blog.

According to the security company that reported the vulnerability to Mozilla, the bug is present in the Windows, Mac OS X and Linux versions of Firefox. Later Thursday, Snyder confirmed that the Windows and Mac versions of Firefox contained the vulnerability, but said her team had not yet verified that the Linux version also had the flaw.

Snyder was responding to news yesterday that 3Com Corp.'s TippingPoint, a security vendor that runs the Zero Day Initiative bug bounty program, had purchased a critical Firefox 3.0 vulnerability from an unnamed researcher and then forwarded information on the bug to Mozilla.

As per its policy, TippingPoint said it would not release details of the bug until Mozilla has crafted a patch. Yesterday, however, it noted that the vulnerability would let hackers execute remote code -- making the bug a critical flaw -- and that it would require some action by the potential victim, such as clicking on a link in an e-mail message or visiting a malicious or compromised site.

Today, Terri Forslof, TippingPoint's manager of security response, expanded somewhat on the vulnerability's range. "It's not operating system specific," she said. "It's browser specific, only on Firefox, but on Windows, Mac and Linux."

Snyder confirmed that she had received word from TippingPoint -- Forslof said she e-mailed Snyder directly with a heads-up -- and that the Mozilla team was looking into the problem. "To protect our users, the details of the issue will remain closed until a patch is made available," she said.

The fix will come in the next security updates for Firefox 2.0 and Firefox 3.0, Snyder said. She declined to be specific about a timetable.

Yesterday, TippingPoint sounded confident that Mozilla would quickly fix the flaw. "Working with Mozilla on past security issues, we've found them to have a good track record and expect a reasonable turnaround on this issue as well," TippingPoint noted in a blog posting of its own.

Mozilla didn't provide additional information or offer recommendations for users, but Forslof was willing to do so. "This is in the same line as lots of other browser vulnerabilities," she said, "so the advice is in the same line, too. Don't click on links in e-mail, make sure the operating system is up to date, and don't visit unsafe sites."

Forslof added that the researcher, who has chosen to remain anonymous, is someone TippingPoint has worked with before. "He's a regular contributor to our program," she said.

She wouldn't disclose more than that, but did say it wasn't unusual for researchers to suddenly reveal a vulnerability that they'd discovered some time before. "I can think of several examples," Forslof said. "It's highly likely that he [found the bug] in their last version [of Firefox] and was just waiting for them to release 3.0 to see if they'd fixed it there."

According to both TippingPoint and Mozilla, the vulnerability is in the older Firefox 2.0 series as well as the brand-new Firefox 3.0, which launched Tuesday.


From: computerworld