Jump to content

Mozilla knew of Pwn2Own bug before CanSecWest


nsane.forums

Recommended Posts

nsane.forums

The vulnerability was described as a “memory safety problem in the array.join function” and was bundled into a security advisory that carries a critical rating.

Posted Image

Even before a pair of researchers hacked into Firefox to snag second place at the CanSecWest Pwn2Own contest, Mozilla knew about the vulnerability and was working on a fix.

That fix arrived today with Firefox 11, a high-priority update that fixes a dozen security flaws that expose Windows and Mac OS X users to a wide range of hacker attacks.

“The security bug reported by ZDI is one we had already identified and fixed through our internal processes,” said Johnathan Nightingale, Senior Director of Firefox Engineering.

Mozilla had originally delayed the release of Firefox 11 to wait for the Pwn2Own vulnerability details but once the open-source group realized it was the same issue that was identified by researcher Jeff Walden, the patch was pushed out the door.

The vulnerability was described as a “memory safety problem in the array.join function” and was bundled into a security advisory that carries a critical rating. At Pwn2Own, researchers William Pinckaers and Vincenzo Iozzo exploited the flaw to launch a remote code execution attack that required no user action beyond browsing to a rigged web page.

Here’s a listing of the vulnerabilities fixed with this Firefox update:

  • MFSA 2012-19 Miscellaneous memory safety hazards (rv:11.0/ rv:10.0.3 / rv:1.9.2.28)
  • MFSA 2012-18 window.fullScreen writeable by untrusted content
  • MFSA 2012-17 Crash when accessing keyframe cssText after dynamic modification
  • MFSA 2012-16 Escalation of privilege with Javascript: URL as home page
  • MFSA 2012-15 XSS with multiple Content Security Policy headers
  • MFSA 2012-14 SVG issues found with Address Sanitizer
  • MFSA 2012-13 XSS with Drag and Drop and Javascript: URL
  • MFSA 2012-12 Use-after-free in shlwapi.dll
Firefox 11 is available for via the browser’s software update utility.

Posted Image View: Original Article

Link to comment
Share on other sites

  • Replies 0
  • Views 637
  • Created
  • Last Reply

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...