Vulnerabilities / Threats

10/19/2009
06:32 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Mozilla Restores Blocked Microsoft Extension For Firefox

A controversial Firefox extension is working again after being blocked as a security risk over the weekend.

Mozilla reversed its decision to block a Microsoft extension for Firefox that was disabled last week because the software was believed to represent a security risk.

The extension at issue, Microsoft's .Net Framework Assistant, has been removed from the Mozilla Add-on blocklist.

The Add-ons blocklist prevents unsafe Firefox extensions from being loaded when Firefox starts. The blocklist currently includes eight other browser extensions that present stability or security issues.

In a post on Friday, Mike Shaver, Mozilla's vice president of engineering, said that Mozilla, with the support of Microsoft, had disabled the Add-on as a security precaution.

Then on Sunday, Shaver said in a blog post that Microsoft's .NET Framework Assistant was restored following Microsoft's confirmation that the extension could not be used to exploit a serious Internet Explorer vulnerability, MS09-054.

A related plugin, Windows Presentation Foundation (WPF), remains blocked, however.

The .Net Framework Assistant provides support for Microsoft's ClickOnce software installation technology, which lets .Net apps download and run within browsers.

It's also a source of ongoing controversy because Microsoft distributed it through its Windows Update service without asking Firefox users if they wanted it. Microsoft also made the extension difficult to remove initially.

Worries about the risk posed by the .Net extension first surfaced in February. As a post on Annoyances.org put it, "This update adds to Firefox one of the most dangerous vulnerabilities present in all versions of Internet Explorer: the ability for Web sites to easily and quietly install software on your PC."

Because some Firefox users may require ClickOnce functionality, Shaver said that Mozilla is working on a way to allow users, particularly enterprise users, to override its Add-ons blocklist.



InformationWeek has published an in-depth report on new software models. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-7682
PUBLISHED: 2018-06-22
Micro Focus Solutions Business Manager versions prior to 11.4 allows a user to invoke SBM RESTful services across domains.
CVE-2018-12689
PUBLISHED: 2018-06-22
phpLDAPadmin 1.2.2 allows LDAP injection via a crafted server_id parameter in a cmd.php?cmd=login_form request, or a crafted username and password in the login panel.
CVE-2018-12538
PUBLISHED: 2018-06-22
In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty provided FileSessionDataStore for persistent storage of HttpSession details, it is possible for a malicious user to access/hijack other HttpSessions and even delete unmatched HttpSessions present in the FileSystem's storage...
CVE-2018-12684
PUBLISHED: 2018-06-22
Out-of-bounds Read in the send_ssi_file function in civetweb.c in CivetWeb through 1.10 allows attackers to cause a Denial of Service or Information Disclosure via a crafted SSI file.
CVE-2018-12687
PUBLISHED: 2018-06-22
tinyexr 0.9.5 has an assertion failure in DecodePixelData in tinyexr.h.