Risk
10/11/2012
11:06 AM
Connect Directly
RSS
E-Mail
50%
50%

Mozilla Suspends Firefox 16 Downloads: Serious Bug

Mozilla warns that Firefox 16 contains significant vulnerability, plans to offer patched version for download as soon as possible.

Just one day after releasing Firefox 16, Mozilla Wednesday suspended downloads of the new software after it discovered a security vulnerability in the browser.

In a security warning, Firefox director of security assurance Michael Coates, said that "the vulnerability could allow a malicious site to potentially determine which websites users have visited and have access to the URL or URL parameters." But he said that Mozilla had seen no evidence that the bug was being exploited by in-the-wild attacks.

Even so, "Firefox 16 has been temporarily removed from the current installer page and users will automatically be upgraded to the new version as soon as it becomes available," said Coates. Furthermore, he noted that "as a precaution, users can downgrade to version 15.0.1," though he said that any current version 16 installations would be automatically updated after the patch gets issued.

Mozilla plans to issue a patched version of Firefox 16 Thursday.

[ Security threats are growing. Read Web API Allows Phishing Attack. ]

In the interim, however, is downgrading to Firefox 15.1 wise? According to vulnerability information provider Secunia, Firefox 15.x contains numerous "highly critical" vulnerabilities that could allow an attacker to remotely bypass the browser's security controls, execute a cross-site scripting attack, spoof websites, crash the browser, or access a user's system. All told, it said there are 23 issues, which remain--as yet--unpatched in version 15, though Mozilla reported fixing 14 known vulnerabilities in version 16.

According to market watcher Net Applications, as of September 2012, Firefox controlled 20% of the desktop browser market, putting it behind Internet Explorer (54%), but ahead of other rivals, including Chrome (19%), Safari (5%), and Opera (2%).

In other security-related browser news, the Electronic Frontier Foundation (EFF) Monday, together with the Tor Project, announced the release of HTTPS Everywhere version 3.

The privacy tool, which is a browser add-on, forces an encrypted HTTPS connection on any website that offers users a choice between HTTP and HTTPS. "Many sites on the Web offer some limited support for encryption over HTTPS, but make it difficult to use," according to the HTTPS Everywhere download page. "For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. The HTTPS Everywhere extension fixes these problems by using a clever technology to rewrite requests to these sites to HTTPS."

Despite the branding, however, the tool won't work everywhere, although it does now work with 1,500 sites--or about twice as many as with the previous version--and gets used by about 2.5 million people. "Our current estimate is that HTTPS Everywhere 3 should encrypt at least a hundred billion page views in the next year, and trillions of individual HTTP requests," said EFF technology projects director Peter Eckersley in a blog post.

So far, stable versions of HTTPS Everywhere have only been available for Firefox. But the EFF and Tor, together with a group of volunteers, are developing a version for Chrome and Chromium, though it's not yet ready for public release.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mathew
50%
50%
Mathew,
User Rank: Apprentice
10/12/2012 | 10:28:29 AM
re: Mozilla Suspends Firefox 16 Downloads: Serious Bug
UPDATE
Mozilla pushed an update for Firefox (16.0.1) at 3pm ET Thursday. This Mozilla security bulletin has more details.
Verdumont Monte
50%
50%
Verdumont Monte,
User Rank: Apprentice
10/11/2012 | 8:28:51 PM
re: Mozilla Suspends Firefox 16 Downloads: Serious Bug
This bug has been fixed already. Please post an update to the article..
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1032
Published: 2014-09-17
Cross-site scripting (XSS) vulnerability in the Euroling SiteSeeker module 3.x before 3.4.5 for EPiServer allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party inf...

CVE-2012-1417
Published: 2014-09-17
Multiple cross-site scripting (XSS) vulnerabilities in Local Phone book and Blacklist form in Yealink VOIP Phones allow remote authenticated users to inject arbitrary web script or HTML via the user field to cgi-bin/ConfigManApp.com.

CVE-2012-1506
Published: 2014-09-17
SQL injection vulnerability in the updateStatus function in lib/models/benefits/Hsp.php in OrangeHRM before 2.7 allows remote authenticated users to execute arbitrary SQL commands via the hspSummaryId parameter to plugins/ajaxCalls/haltResumeHsp.php. NOTE: some of these details are obtained from th...

CVE-2012-1507
Published: 2014-09-17
Multiple cross-site scripting (XSS) vulnerabilities in OrangeHRM before 2.7 allow remote attackers to inject arbitrary web script or HTML via the (1) newHspStatus parameter to plugins/ajaxCalls/haltResumeHsp.php, (2) sortOrder1 parameter to templates/hrfunct/emppop.php, or (3) uri parameter to index...

CVE-2012-2583
Published: 2014-09-17
Cross-site scripting (XSS) vulnerability in Mini Mail Dashboard Widget plugin 1.42 for WordPress allows remote attackers to inject arbitrary web script or HTML via the body of an email.

Best of the Web
Dark Reading Radio
Listen Now A Grown-Up Conversation About Passwords
A Grown-Up Conversation About Passwords