Risk
7/15/2010
12:34 PM
50%
50%

Mozilla Disables Firefox Add-On, Recommends Upgrade

The disabled Mozilla Sniffer was intercepting login data and transmitting it to a third-party website; upgrading to the latest version of the CoolPreviews add-on is recommended due to security vulnerability.

The Mozilla Foundation, which maintains the popular Firefox web browser, announced Tuesday that it removed a Firefox add-on called "Mozilla Sniffer" which was intercepting login data and transmitting it to a third-party website. Mozilla also warned of a security escalation vulnerability in the CoolPreviews add-on and recommended that users upgrade immediately to the latest version.

Before its removal, Mozilla Sniffer had been downloaded approximately 1,800 times and had 334 active daily users. Mozilla said that each of them should have now received an uninstall notification. Furthermore, anyone with the add-on currently installed can uninstall it to prevent further passwords from being intercepted. Mozilla also recommended that anyone who has used the tool immediately change all of their passwords.

At the time of the vulnerability announcement, however, Mozilla noted that the website collecting information from Mozilla Sniffer was down, making it unclear whether the threat was still active.

Mozilla Sniffer was a variation on Tamper Data, designed for viewing and modifying HTTP and HTTPS headers and post parameters. Many developers use that add-on for testing web application behavior, to monitor exactly what data gets passed via HTTP, or for penetration testing. Tamper Data, however, doesn't route intercepted data to an external website.

Mozilla also warned that a security escalation vulnerability had been found in version 3.0.1 of the CoolPreviews add-on, which could be exploited via a specially crafted hyperlink. According to Mozilla, "if the user hovers the cursor over this link, the preview function executes remote JavaScript code with local chrome privileges, giving the attacking script control over the host computer."

Proof of concept code for exploiting the vulnerability has been released, though Mozilla said that no malicious exploits have yet been detected. But as of Tuesday, 177,000 users - less than one-quarter of the software's install base - were still running a vulnerable version. Mozilla advised them to install the latest, patched version.

To prevent add-ons such as Tamper Data from gaining distribution, Mozilla is also retooling its code-review policies. Technically, Tamper Data was an experimental add-on, meaning that users had to click through warnings that it hadn't been reviewed and might pose a threat.

As Mozilla noted in its security announcement, "unreviewed add-ons are scanned for known viruses, trojans, and other malware, but some types of malicious behavior can only be detected in a code review."

Accordingly, Mozilla plans to require code reviews for all add-ons before they become publicly available on Mozilla's website.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6228
Published: 2014-12-28
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split ...

CVE-2014-6229
Published: 2014-12-28
The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string,...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.