Firefox 3.5 new exploit - confirmed
Updated story, thanks to for helping figure it out!
The mozilla security blog confirms an exploit against an unpatched vulnerability Firefox 3.5 exists and has been made public.
Do note that Heisse tried to confirm the vulnerability and only managed a crash on Vista and can't seem to make it work on Windows 7 RC1
http://www.h-online.com/security/First-Zero-Day-Exploit-for-Firefox-3-5--/news/113761
The mozilla blog above has a workaround by temporary disabling the javascript.options.jit.content
setting in about:config
Alternatively one could install and use NoSCript to disable all javascript by default.
--
Swa Frantzen -- Section 66
UPDATE
Dean wrote in to say that this exploit has been spotted in the wild. The attacked just used Metasploit to create it and put a PoisonIvy client as the payload. Unfortunately, the payload has been packed with a packer that prevented some AV vendors so the detection isn't all that great.
Good news is that NoScript will protect you against it, but also that it takes some time for the exploit to execute (in a lot of cases the user is prompted by Firefox that a script on the page is running too long); it also does not appear to be 100% reliable.
--
Bojan
Comments
http://blog.mozilla.com/security/2009/07/14/critical-javascript-vulnerability-in-firefox-35/
drew
Jul 14th 2009
1 decade ago
Swa
Jul 14th 2009
1 decade ago
drew
Jul 14th 2009
1 decade ago
Halibut
Jul 14th 2009
1 decade ago
Swa
Jul 14th 2009
1 decade ago
xyberpix
Jul 16th 2009
1 decade ago
dean
Jul 17th 2009
1 decade ago
Jean BRUDER
Jul 17th 2009
1 decade ago