Mozilla to skip CSRF bug patch in next Firefox update

Mozilla Corp. today said that it will ship security updates to Firefox 3.5 and Firefox 3.6 next Tuesday, ending a debate about whether to wait for a patch that affects Adobe’s software.

Firefox 3.5.17 and Firefox 3.6.14 will now appear Tuesday, March 1, Mozilla disclosed in meeting notes published today.

Originally slated for release on Feb. 14, the security updates were held while Mozilla developers investigated a bug that affected some, though not all, users of the betas. According to Mozilla, the bug caused some copies of the updates to repeatedly crash. Mozilla then backed out a recent bug fix to retest the betas.

Around the same time, a cross-site request forgery (CSRF) vulnerability surfaced. “Adobe is worried about it being a 0-day and wants us to ship quickly,” said Mozilla on its site . The vulnerability is presumably in Firefox, but Mozilla has provided no information on how it may impact Adobe software.

Unlike Google’s Chrome, Firefox does not bundle Adobe software. But Adobe’s Reader and Flash plug-ins are found in most users’ browsers.

Adobe has said it knows nothing about a potential zero-day that would affect its software and/or Firefox.

Computerworld was unable to locate any public discussion of a CSRF vulnerability in Firefox or an Adobe plug-in, such as Reader or Flash.

Later in its discussions over the release timelines for Firefox 3.5.17 and 3.6.14, Mozilla decided that the CSRF bug “isn’t serious enough to build for explicitly,” and so would go ahead with plans to release the two updates sans patch.

Mozilla did not immediately reply to a request for confirmation, but from a reading of the company’s notes on Firefox 3.5.17 and 3.6.14, the patch for the CRSF vulnerability will not be included in next week’s updates.

Some CSRF vulnerabilities can allow attackers to execute remote code against a vulnerable browser; if that’s the case with this Firefox flaw and if it is not patched soon, the browser may be vulnerable to attack at Pwn2Own, the hacking contest that kicks off March 9 at the CanSecWest security conference in Vancouver, British Columbia.

Firefox will be one of four browsers — the others are Chrome, Microsoft’s Internet Explorer and Apple’s Safari — that will be targeted by attackers hoping to walk off with $15,000 or $20,000 in cash.

Pwn2Own’s rules state that the targeted browsers will be “the latest release candidate at the time of the contest.”

Last year, Mozilla confirmed a critical vulnerability in Firefox less than a week before 2010’s Pwn2Own, but said it wouldn’t fix the flaw until after the contest. Pwn2Own organizers then ruled that hackers would not be allowed to use the vulnerability to hack Firefox.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now