Vulnerabilities / Threats
10/19/2009
06:32 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Mozilla Restores Blocked Microsoft Extension For Firefox

A controversial Firefox extension is working again after being blocked as a security risk over the weekend.

Mozilla reversed its decision to block a Microsoft extension for Firefox that was disabled last week because the software was believed to represent a security risk.

The extension at issue, Microsoft's .Net Framework Assistant, has been removed from the Mozilla Add-on blocklist.

The Add-ons blocklist prevents unsafe Firefox extensions from being loaded when Firefox starts. The blocklist currently includes eight other browser extensions that present stability or security issues.

In a post on Friday, Mike Shaver, Mozilla's vice president of engineering, said that Mozilla, with the support of Microsoft, had disabled the Add-on as a security precaution.

Then on Sunday, Shaver said in a blog post that Microsoft's .NET Framework Assistant was restored following Microsoft's confirmation that the extension could not be used to exploit a serious Internet Explorer vulnerability, MS09-054.

A related plugin, Windows Presentation Foundation (WPF), remains blocked, however.

The .Net Framework Assistant provides support for Microsoft's ClickOnce software installation technology, which lets .Net apps download and run within browsers.

It's also a source of ongoing controversy because Microsoft distributed it through its Windows Update service without asking Firefox users if they wanted it. Microsoft also made the extension difficult to remove initially.

Worries about the risk posed by the .Net extension first surfaced in February. As a post on Annoyances.org put it, "This update adds to Firefox one of the most dangerous vulnerabilities present in all versions of Internet Explorer: the ability for Web sites to easily and quietly install software on your PC."

Because some Firefox users may require ClickOnce functionality, Shaver said that Mozilla is working on a way to allow users, particularly enterprise users, to override its Add-ons blocklist.



InformationWeek has published an in-depth report on new software models. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

CVE-2014-3991
Published: 2014-07-11
Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr ERP/CRM 3.5.3 allow remote attackers to inject arbitrary web script or HTML via the (1) dol_use_jmobile, (2) dol_optimize_smallscreen, (3) dol_no_mouse_hover, (4) dol_hide_topmenu, (5) dol_hide_leftmenu, (6) mainmenu, or (7) leftmenu pa...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.