Risk
1/31/2013
09:39 AM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Firefox Moves To Block Java, Silverlight, Adobe Reader

Mozilla's "click to play" move will block all plug-ins from executing without explicit user authorization.

Mozilla has announced that all Firefox plug-ins, barring the most recent version of Flash, will soon require explicit user authorization before being allowed to run.

"Mozilla is changing the way Firefox loads third party plug-ins such as Flash, Java and Silverlight," said Michael Coates, director of security assurance for Mozilla, in a blog post. "This change will help increase Firefox performance and stability and provide significant security benefits, while at the same time providing more control over plug-ins to our users."

Mozilla's move come in the wake of widespread, in-the-wild attacks against the Java browser plug-in, related user security confusion and warnings that new zero-day vulnerabilities in Java -- not yet exploited by attackers -- have been disclosed to Oracle and not yet patched.

[ Maybe learning parts of speech back in elementary school wasn't a waste of time. See Want Stronger Passwords? Try Bad Grammar. ]

"Leveraging Click to Play, Firefox will only load plug-ins when a user takes the action of clicking to make a particular plug-in play, or the user has previously configured Click To Play to always run plug-ins on the particular website," said Coates.

With click to play, Firefox was set to automatically block plug-ins that Mozilla deemed to pose a significant security or stability risk. "This includes vulnerable and outdated versions of Silverlight, Adobe Reader and Java," said Coates. But the security blocks had stopped there. "Previously Firefox would automatically load any plug-in requested by a website," he said.

Click-to-play capabilities have long been lauded by security experts for adding an extra level of protection that helps block the silent exploitation of vulnerable plug-ins. Of course, like so many types of security, there's a caveat: users will have to pay attention to warnings, and not allow plug-ins to run that shouldn't be running.

Adobe, which develops Flash Player and Adobe Reader -- and which has already enjoyed the attentions now being paid to Java by attackers -- has lauded Mozilla's move to block all browser plug-ins from automatically running. "The Adobe team has worked hard to improve patch adoption by delivering background updaters for Flash Player and Adobe Reader. In addition, we have worked with partners, such as Microsoft and Google, to reduce update fatigue by delivering patches through existing update mechanisms," said Peleus Uhley, platform security strategist for Adobe, in a blog post.

But plug-ins that automatically update themselves -- and Oracle notably has yet to release such a capability for Java runtime environment or the Java browser plug-in -- and distributing updates through third parties can only go so far. "One of the hardest challenges in protecting end users is reaching what is sometimes referred to as the 'long tail' in an update graph," Uhley said. "These are the users who, for various reasons, have not updated their systems in several months or even years. Reaching these last few end users can be difficult if they have disabled their update mechanisms. Unfortunately, they are also the users who are most likely to be successfully attacked."

Failing to keep plug-ins updated comes at a security cost, since updates often include fixes for known vulnerabilities. On that front, Coates also urged Firefox users to visit a dedicated website "to determine if plug-ins are current."

Getting accurate information on a plug-in, however, isn't always a straightforward process. One of the criticisms recently leveled at Java by security researchers, for example, is that browsers have been incorrectly detecting which version of Java is installed, as well as sometimes altogether misreporting if Java is, or isn't, installed.

Oracle failed to respond to emailed questions, sent earlier this month, about whether fixing those Java installation and version-reporting errors would require an update from Oracle, browser makers or both.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2008-3277
Published: 2014-04-15
Untrusted search path vulnerability in a certain Red Hat build script for the ibmssh executable in ibutils packages before ibutils-1.5.7-2.el6 in Red Hat Enterprise Linux (RHEL) 6 and ibutils-1.2-11.2.el5 in Red Hat Enterprise Linux (RHEL) 5 allows local users to gain privileges via a Trojan Horse p...

CVE-2010-2236
Published: 2014-04-15
The monitoring probe display in spacewalk-java before 2.1.148-1 and Red Hat Network (RHN) Satellite 4.0.0 through 4.2.0 and 5.1.0 through 5.3.0, and Proxy 5.3.0, allows remote authenticated users with permissions to administer monitoring probes to execute arbitrary code via unspecified vectors, rela...

CVE-2011-3628
Published: 2014-04-15
Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.0...

CVE-2012-0214
Published: 2014-04-15
The pkgAcqMetaClearSig::Failed method in apt-pkg/acquire-item.cc in Advanced Package Tool (APT) 0.8.11 through 0.8.15.10 and 0.8.16 before 0.8.16~exp13, when updating from repositories that use InRelease files, allows man-in-the-middle attackers to install arbitrary packages by preventing a user fro...

CVE-2013-4768
Published: 2014-04-15
The web services APIs in Eucalyptus 2.0 through 3.4.1 allow remote attackers to cause a denial of service via vectors related to the "network connection clean up code" and (1) Cloud Controller (CLC), (2) Walrus, (3) Storage Controller (SC), and (4) VMware Broker (VB).

Best of the Web