11:06 AM

Mozilla Suspends Firefox 16 Downloads: Serious Bug

Mozilla warns that Firefox 16 contains significant vulnerability, plans to offer patched version for download as soon as possible.

Just one day after releasing Firefox 16, Mozilla Wednesday suspended downloads of the new software after it discovered a security vulnerability in the browser.

In a security warning, Firefox director of security assurance Michael Coates, said that "the vulnerability could allow a malicious site to potentially determine which websites users have visited and have access to the URL or URL parameters." But he said that Mozilla had seen no evidence that the bug was being exploited by in-the-wild attacks.

Even so, "Firefox 16 has been temporarily removed from the current installer page and users will automatically be upgraded to the new version as soon as it becomes available," said Coates. Furthermore, he noted that "as a precaution, users can downgrade to version 15.0.1," though he said that any current version 16 installations would be automatically updated after the patch gets issued.

Mozilla plans to issue a patched version of Firefox 16 Thursday.

[ Security threats are growing. Read Web API Allows Phishing Attack. ]

In the interim, however, is downgrading to Firefox 15.1 wise? According to vulnerability information provider Secunia, Firefox 15.x contains numerous "highly critical" vulnerabilities that could allow an attacker to remotely bypass the browser's security controls, execute a cross-site scripting attack, spoof websites, crash the browser, or access a user's system. All told, it said there are 23 issues, which remain--as yet--unpatched in version 15, though Mozilla reported fixing 14 known vulnerabilities in version 16.

According to market watcher Net Applications, as of September 2012, Firefox controlled 20% of the desktop browser market, putting it behind Internet Explorer (54%), but ahead of other rivals, including Chrome (19%), Safari (5%), and Opera (2%).

In other security-related browser news, the Electronic Frontier Foundation (EFF) Monday, together with the Tor Project, announced the release of HTTPS Everywhere version 3.

The privacy tool, which is a browser add-on, forces an encrypted HTTPS connection on any website that offers users a choice between HTTP and HTTPS. "Many sites on the Web offer some limited support for encryption over HTTPS, but make it difficult to use," according to the HTTPS Everywhere download page. "For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. The HTTPS Everywhere extension fixes these problems by using a clever technology to rewrite requests to these sites to HTTPS."

Despite the branding, however, the tool won't work everywhere, although it does now work with 1,500 sites--or about twice as many as with the previous version--and gets used by about 2.5 million people. "Our current estimate is that HTTPS Everywhere 3 should encrypt at least a hundred billion page views in the next year, and trillions of individual HTTP requests," said EFF technology projects director Peter Eckersley in a blog post.

So far, stable versions of HTTPS Everywhere have only been available for Firefox. But the EFF and Tor, together with a group of volunteers, are developing a version for Chrome and Chromium, though it's not yet ready for public release.

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
Verdumont Monte
Verdumont Monte,
User Rank: Apprentice
10/11/2012 | 8:28:51 PM
re: Mozilla Suspends Firefox 16 Downloads: Serious Bug
This bug has been fixed already. Please post an update to the article..
User Rank: Apprentice
10/12/2012 | 10:28:29 AM
re: Mozilla Suspends Firefox 16 Downloads: Serious Bug
Mozilla pushed an update for Firefox (16.0.1) at 3pm ET Thursday. This Mozilla security bulletin has more details.
Register for Dark Reading Newsletters
White Papers
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio