Berkeley CSUA MOTD:Entry 32192
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/03 [General] UID:1000 Activity:popular
4/3     

2004/7/9-11 [Computer/SW/WWW/Browsers] UID:32192 Activity:moderate
7/8     Oops--massive Mozilla/Firefox flaw:
        http://www.eweek.com/article2/0,1759,1621463,00.asp
        Guess that's one reason NOT to migrate to Mozilla.
        \_ and another reason not to use windows
        \_ Does this affect Netscape 6.x/7.x, as it seems they are Mozilla?
           If so, does one just apply the patch extension to Netscape 6.x/7.x,
           or can/should one download an entirely new version, like
           Firefox 0.9.2?
           \_ op here, URL http://bugzilla.mozilla.org/show_bug.cgi?id=250180
           \_ (replying to myself)
              http://bugzilla.mozilla.org/show_bug.cgi?id=250180
              says the bug affects "Trunk".  Netscape 7.x is branched from
              Mozilla 1.4 ... so this would imply it has the problem, unless
              the Netscape people fixed it themselves a long time ago.
              \_ (replying to myself)
                 I got over my laziness and downloaded a 7.1 just now.
                 It has the same bug.  I applied the official xpi patch
                 ("What Mozilla users should know ...") and it works.
        \_ Although technically this is a problem in Windoze, why doesn't
           Mozilla test against it, given it is SOOO obvious?  Think it as
           an malicious bug left by M$, shoulnd't Mozilla be more vigilant?
           \_ http://bugzilla.mozilla.org/show_bug.cgi?id=163767
              From the above link it looks like the suggestion to secure this
              hole was made in 2002, but they got into a long discussion and
              after the shell: vulnerability was published a couple days ago,
              they finally did a small fix for that.
        \_ See?  This never would have happened in a safe source product like
           IE.
           \_ ob The big hole from last week wasn't fully patched, and MS
              still officially recommends you turn off JavaScript while it's
              being fixed.
              \_ That's an entirely different issue and it's only been a
                 week.  The mozilla problem has been public for 2 years and
                 they decided to ignore it until people outside their nice
                 warm little cocoon complained about it.  Kinda screws up
                 that whole theory about more eyes = better code when the
                 hands don't do a thing to fix what the eyes saw.  This is
                 just pure laziness and a huge problem with the "scratch
                 an itch" concept.  I guess no one had an itch for the last
                 2 years to fix a known hole big enough to throw an
                 elephant herd through.
2025/04/03 [General] UID:1000 Activity:popular
4/3     

You may also be interested in these entries...
2013/8/22-10/28 [Computer/Companies/Yahoo, Industry/SiliconValley] UID:54732 Activity:nil
8/22    http://marketingland.com/yahoo-1-again-not-there-since-early-08-56585
        Y! is back to #1! Marissa, you are SEXY!!!
        \_ how the heck do you only have 225M uniq vis/month when there
           are over 1 billion internet devices out there?
           \_ You think that every single Internet user goes to Y!?
        \_ Tall blonde skinny pasty, not my type at all -former Y!
	...
2013/6/26-8/13 [Computer/Domains, Computer/Networking, Computer/SW/WWW/Browsers] UID:54697 Activity:nil
6/26    This ones for you psb -ausman
        http://25.media.tumblr.com/027fe67c84c2288cc16e9c85db690834/tumblr_mp0ag8DCQI1qzwozco1_1280.jpg
        \- that's pretty good. i wish someone had put the idea to be before i saw
           it on the internet, so see if i'd have put the 9 justices in the same
           boxes. JOHN PAUL STEVENS >> All the sitting justices. --psb
        \- that's pretty good. i wish someone had put the idea to be before i
	...
2012/5/18-7/20 [Computer/SW/WWW/Browsers] UID:54392 Activity:nil
5/18    On my Win7 machine, I've been using a PuTTY ssh session to soda as a
        proxy for my FireFox to bypass my company's OpenDNS when I visit
        http://tv.yahoo.com and so on.  It has been working fine for a long while.
        However, in the past couple weeks or so, my FireFox would either take
        several minutes to load the page, or failes to load it after several
        minutes.  I haven't changed any settings on my Win7 machine.  Rebooting
	...
2012/4/2-6/4 [Computer/SW/Languages/Java, Computer/SW/RevisionControl] UID:54353 Activity:nil
4/02    We use Perforce at work for revision control. It seems to work okay.
        Lately, a lot of the newer developers are saying that Perforce
        sucks and we should switch to Mercurial or Git. I have done some
        searching on the Internet and some others have this opinion. Added
        advantage is that Mercurial and Git are free. However, there would
        be some work to switch for the sysadmins and the developers.
	...
2012/4/26-6/4 [Computer/Networking] UID:54371 Activity:nil
4/26    I see that soda has an ipv6 address but ipv6 traffic from this box
        doesn't actually work (ping6 <DEAD>ipv6.google.com<DEAD>, ping6 http://www.v6.facebook.com
        Is this expected to work?
        \_ Soda doesn't have a real IPv6 address.  The IPv6 addresses you see
           in ifconfig are just link-local addresses; any IPv6-capable machine
           will autogenerate these, whether or not it's connected to an IPv6
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
2012/2/5-3/26 [Computer/SW/WWW/Browsers] UID:54300 Activity:nil
2/5     How is Firefox on version 10, while I still have 3.6 installed.
        I wait for the X.1 versions and they never come out.
        \_ I'm also on 3.6.26.  It claims that versions 4 - 10 are all faster
           than 3.6.x, but do they use more memory?  Thx.
           \_ Newer Firefox versions use less memory too:
              http://www.maximumpc.com/article/news/mozillas_memshrink_program_brings_big_memory_savings_firefox_7
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
Cache (3669 bytes)
www.eweek.com/article2/0,1759,1621463,00.asp
Larry Seltzer July 8, 2004 Updated: The Mozilla Foundation has confirmed findings that its Mozilla and Firefox browsers are vulnerable to attacks using the "shell:" scheme, which execute arbitrary code under Windows without the user having to click a link. Security researchers are reporting another security issue in Web browsing under Windows, but this time Internet Explorer is not the culprit. The Mozilla Foundation's Mozilla and Firefox are reported as vulnerable. The reports indicate that links in a Web page using the "shell:" scheme can execute arbitrary programs on the user's system. The attacker would have to know the location in the file system of the program, but there are known programs in Windows with buffer overflows. This means the attacker could create a link in a Web page that could execute arbitrary code under Windows. Through the use of an appropriate META tag, the attack could load without the user having to click a link explicitly. In the definition of a URI (Uniform Resource Identifier), the technical name for a Web address, "shell:" is not a protocol like http but a scheme. Some schemes map directly to protocol handlers in the browser itself or externally, such as those that handle audio and video media. Current versions of Mozilla and Firefox pass unknown protocol handlers to the operating system shell to handle. In this case, the location passed to the shell is a program name that the shell executes. Click here to read about the latest Internet Explorer exploit. Other researchers reported that certain links in Mozilla could cause a denial of service in the system by causing Mozilla to open large numbers of windows and consume 100 percent of CPU capacity. An old discussion in the Mozilla bug report database considers the possibility of addressing this problem, but the developers decided against it since the program has a facility for letting the user disallow specific external protocols and schemes, including shell:. The developers considered changing from scheme blacklisting to whitelisting, in which case all schemes and protocols would be disallowed unless explicitly allowed. Mozilla Foundation spokesmen said a future version of the browsers will change to whitelisting, but the interim fix just disables the shell protocol. Several other schemes, such as vbscript, are already disabled by default. com Special Report: Internet Security Internet Explorer is reported as being less vulnerable. When the user clicks on the link, it opens an "open/save" dialog box in which the user is allowed either to run the program, save it to disk or cancel. Mozilla and Firefox simply run the program without any further user action. According to one report, similar functionality is available on Windows 2000 but with different syntax. com tested the reported vulnerability on Mozilla Firefox and confirmed the reported behavior. We also confirmed the appearance of the open/save dialog on Windows XP SP1. In our tests on Windows XP SP2, links with the shell: protocol failed to operate at all. Editor's Note: This story was updated to include a response from the Mozilla Foundation and further explanation of the bug's nature. DiskPie Pro, NEW from the PCMagcom Utility Library, lets you manage and reclaim precious hard drive real estate: * Quickly Identify Space-Hogging Files, Folders * Find & Manage Your Biggest Files * Set Limits & Get Alerts When You Exceed Them * Powerful, Easy-to-Customize Pie Charts Make It Easy! eWEEK and Spencer F Katt are trademarks of Ziff Davis Publishing Holdings, Inc. Reproduction in whole or in part in any form or medium without express written permission of Ziff Davis Media Inc.
Cache (1409 bytes)
bugzilla.mozilla.org/show_bug.cgi?id=250180
Description: Opened: 2004-07-07 06:46 PDT User-Agent: Mozilla/50 (Windows; AFAIK all shell shortcuts in IE will also work in mozilla. Addresses such as "shell:cookies" passes the call to explorer and it shows the desired location. Address to individual files or cookies are handled by Mozilla and treated as a "file:" protocol. While I have not looked into the exploitability of this behavior, it would seem to be a security risk as IE has supposedly dropped this functionality in SP1 for IE 6 2) By making a request for a file that does not exist on the user's system using the "shell:" prefix, Mozilla will continue to open windows until the user's system crashes. So even if 1) is not percieved as a true bug, 2) definately is a bug. Daniel Veditz 2004-07-07 13:42 PDT ------- From Full-Disclosure: --------------------- This is dangerous. Based on the file extension of the shell protocol different applications may be launched. The trick is to find an application that will overflow when given a very long parameter. Brant Langer Gurganus 2004-07-08 19:17 PDT ------- I am not sure the exact procedure, but in the case where it opened many windows, I was able to use ALT+F4 down to the last window (which had multiple tabs and so it wouldn't close). I then clicked cancel on the dialog and the windows quit opening. That might be investigated and noted as a workaround if you become victim to this issue.
Cache (8192 bytes)
bugzilla.mozilla.org/show_bug.cgi?id=163767
and explected future exploits, allowing any registered protocol in the Windows registry is a time bomb. I can see that many people will want the functionality (that's what it's for, I guess), but some users will feel very uncomfortable, if any installed application could possibly the base for an attack. A major selling point for Mozilla and against MSIE is that it is not integrated that much with Windows. Add a pref so that the user can disable the lookup of protocol handlers outside of Mozilla. A pref to selectively enable some of these protocol handlers would be good (and it very cheap). then replace: 460 if (externalProtocol || NS_FAILED(rv)) with: if (externalProtocol || (NS_FAILED(rv) && useExternal)) That should do the trick. Created an attachment (id=96113) Possible Fix, version 1 This compiles on Linux, but it's still untested. Somebody on Win32 please test, if it works as specified. Try eg the following: 1 Pick an uncommon URL scheme that you have a protocol handler for in the Windows registry and that you can trigger, eg hcp:. hcp, false (if you chose hcp:) 7 Start Mozilla, click on URL. Ben Bucksch 2002-08-22 07:05 PDT ------- I think that you can delete the offending protocol handlers out of the Windowes registry, so there is a workaround. A full-blown UIis going to be hard, because we'll have to enumerate all available protocols handlers in the prefs dialog and offer a checkbox/listitem for each of them to allow users to selectively enable certain external protocol handlers. ru 2002-08-22 07:26 PDT ------- >I think that you can delete the offending protocol handlers out of >the Windowes registry, so there is a workaround Oh, why must I edit registry to make my browser safe? More, "vbscript:" is probably required for internal Windows needs (MSHTML+VBScript engine is used in Microsoft Management Console and many other system utilities), and registry hacking can violate system control abilities. ru 2002-08-22 08:00 PDT ------- We must understand, what did we add external protocol support for? Previous versions of Mozilla (including 11b) didn't it, and I was not a bit suffering from it. Maybe, Mozilla plugins, such as RealAudio, might add another protocols and register it in Mozilla configuration files. But other protocols, which have no any relation to Mozilla componets and plugins, must be disabled - otherwise we shall go on a way of the Microsoft, aspiring to grasp immense and to push everything in their Internet Explorer. net 2002-08-22 11:23 PDT ------- Is your patch the first implementation of this, or modifying the existing prefs that are supported? I'm working on URL scheme test cases right now, so I'm hoping you are going to say that the scheme handling is caps insensitive, as well as handling other aspects of scheme formating: (from RFC 2396:) scheme = alpha *( alpha | digit | "+" | "-" | "." Does anyone know how well the punctuation will work in a pref? Ben Bucksch 2002-08-22 12:20 PDT ------- benc, you raise valid problems, but that's not exactly what this bug is about, it just makes them more obvious. The scheme-specific prefs are already there, I just added the useAnyExternal pref. I do intend to make some sort of limited UI for this, I am just not sure how. David Bradley 2002-08-22 12:35 PDT ------- Ok, the last patch seems to work. useAnyExternal to true and MMS worked set both to true and MMS worked set both to false and MMS doesn't work One concern I have is that when useAnyExternal is absent or false we say the protocol isn't registered, which isn't exactly true. I know it's more work, but there probably should be a separate error message for this, rather than just reusing the protocol not registered one. Once I removed them from there, it worked like you stated. This isn't the result of your patch, but the error paths are a little hard to follow in the code. For instance the: if (externalProtocol || (NS_FAILED(rv) && useAnyExternal) could be testing the rv of the GetBoolPref or the CallGetService, depending on the useAnyExternal pref. useSystemDefaults" (default false), but it's only looked at in docshell and not where we actually need it. You might want to remove that one or combine it with the prefs you're working on. Darin: you, Mitch and I were looking at URIloader, Ben's poking at IOService. Which is a better place to trap these in your Necko design? Sven Krohlas 2002-08-28 10:12 PDT ------- Well, a more general comment: Why do we need to support starting another application, when we stumble over an external protocol? Darin Fisher (IBM) 2002-08-28 13:31 PDT ------- IOService is a good catch-all i think. URL strings get converted to nsIURI objects via nsIOService, and that is where we decide to talk to the default protocol handler when we encounter an unknown protocol scheme. Boris Zbarsky (out of town June 14 -- July 11, no email then) 2002-08-28 15:03 PDT ------- > Why do we need to support starting another application, when we stumble overan > external protocol? So that streaming medial players (realplayer in particular) will work correctly. This is just like asking why we need to start another application when we encounter a type we don't handle internally or via plugin... Darin Fisher (IBM) 2002-08-28 16:07 PDT ------- then those streaming media players are currently broken on linux because we ignore unknown protocol schemes under linux. seems mac, windows, and os2 each resort to launching external apps. This data (in our case, playlist) may contain URLs with internal WinAmp protocols. I think, this is safe and pellucid alternative in comparison with calling non-internal protocols directly from Mozilla. Boris Zbarsky (out of town June 14 -- July 11, no email then) 2002-08-29 00:08 PDT ------- > 0 Streaming application, such as WinAmp, installs as plugin to handle specific > MIME-type (eg WinAmp playlist - "audio/mpegurl"). "As plugin" has its own issues, btw, like running in the same process space as the browser.... com/bid/5445 But if user installs one or another plugin, he understands that if his system will be cracked via similar vulns, it will be guilt of plugin, not a browser. ru 2002-08-29 00:58 PDT ------- Another consideration - by now plugins can be (and are by default) disabled in e-mail messages. This prevents using plugin vulnerabilities for personalized attacks. Sven Krohlas 2002-08-29 01:01 PDT ------- For me it was always the following: if my browser doesn't understand the protocol or file type it tries to find a plug-in who can cope with it. If it can't find one, then I get a error message or asks me to save the file. That's the way it was working, and that's the way it should work. A user should be able to cut and paste a link into another application if he likes to view things linked by protocols Mozilla and its plug-ins can't handle. If we have a look at the registry to find a corresponding application (and I'm strongly against it) it should look like the following: "Mozilla can't cope with the URL you opened. But we found another application on your computer which could. There is a reason I recommend Mozilla to my friends: security. And they slowly start to understand what it means, since some virii were happyly exchanged between them via Outlook. Now some of them don't use Outlook anymore (you may guess what they are using now :) If they catch the fact, thet we can have the same (or nearly) problems in Mozilla, why should they use it? If some Mozilla distributors want this feature: just take the code and add it. is safe and pellucid alternative > in comparison with calling non-internal protocols directly from Mozilla. Calling external apps with data from the net is dangerous, no matter, if using strange protocols or file types. Add the pref, default it to use external protocols, make a UI, and we can be all happy. If you want security, use Beonex Communicator (or let your friends use it) :-). If that's not enough for you, please open another bug to argue about the default pref. ru 2002-08-29 08:22 PDT ------- >Add the pref, default it to use external protocols, >make a UI, and we can be all happy Main question is: for what, generally, we need to use external non-standard prot...