Vulnerabilities / Threats
10/19/2009
06:32 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Mozilla Restores Blocked Microsoft Extension For Firefox

A controversial Firefox extension is working again after being blocked as a security risk over the weekend.

Mozilla reversed its decision to block a Microsoft extension for Firefox that was disabled last week because the software was believed to represent a security risk.

The extension at issue, Microsoft's .Net Framework Assistant, has been removed from the Mozilla Add-on blocklist.

The Add-ons blocklist prevents unsafe Firefox extensions from being loaded when Firefox starts. The blocklist currently includes eight other browser extensions that present stability or security issues.

In a post on Friday, Mike Shaver, Mozilla's vice president of engineering, said that Mozilla, with the support of Microsoft, had disabled the Add-on as a security precaution.

Then on Sunday, Shaver said in a blog post that Microsoft's .NET Framework Assistant was restored following Microsoft's confirmation that the extension could not be used to exploit a serious Internet Explorer vulnerability, MS09-054.

A related plugin, Windows Presentation Foundation (WPF), remains blocked, however.

The .Net Framework Assistant provides support for Microsoft's ClickOnce software installation technology, which lets .Net apps download and run within browsers.

It's also a source of ongoing controversy because Microsoft distributed it through its Windows Update service without asking Firefox users if they wanted it. Microsoft also made the extension difficult to remove initially.

Worries about the risk posed by the .Net extension first surfaced in February. As a post on Annoyances.org put it, "This update adds to Firefox one of the most dangerous vulnerabilities present in all versions of Internet Explorer: the ability for Web sites to easily and quietly install software on your PC."

Because some Firefox users may require ClickOnce functionality, Shaver said that Mozilla is working on a way to allow users, particularly enterprise users, to override its Add-ons blocklist.



InformationWeek has published an in-depth report on new software models. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4262
Published: 2014-07-28
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-...

CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2013-7393
Published: 2014-07-28
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions...

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.