More discussion on the Firefox 1.5.0.3 “image bug”



There’s quite a bit more discussion on a DOS bug in Firefox 1.5.0.3, the link goes to a site where they’ve confirmed the issue and there is a link there to a POC, so be cautious. It turns out that using javascript, image tags can be made to have a mailto: link which can automatically launch tons of instances of whatever default mailhandler a system has (essentially one for each image tag.) Right now, this sounds more like a Denial of Service risk, as I don’t see at this point any evidence that anything WORSE could be done than really freezing up the system with too many copies of the mail program open.


There have been rumblings about this since at least May 6th… Sans (Incidents.org) had this to say about a workaround…

One possible workaround is to turn off automatic startup of your e-mai application in Firefox. To do so, enter in the URL bar: about:config . This will show a long list of configuration options. Search for ‘warn-external.mailto’ (e.g. use the ‘Filter’ option). By default, this value should be set to “false”. Click on the line to toggle it to “true” (it will be bold if it is not set to the default).Now, whenever you click on a mailto: link, you will first be asked if you would like to start your e-mail application. In the case of the exploit this will keep your system responsive, even though you may still have to click on all the dialogs. Disabling javascript is another option, or disabling mailto: link all together. But these options are more intrusive.

It doesn’t seem to be a high risk vulnerability – but a low danger, annoyance denial of service risk.

Related Posts

Blog Traffic Exchange Related Posts
  • Wireless Driver Vulnerabilities There are a couple notes to pass along with regards to some pretty serious vulnerabilities in various wireless network adapter drivers. First, Sans has information on some Intel Centrino updates that resolve some vulnerabilities that would affect the Windows Centrino driver and the ProSet management software. F-secure chimes in on......
  • Exploit for Unpatched Internet Explorer vulnerability Well.... buckle your seatbelts it's going to be a bumpy start to the week. the securityfix as well as incidents.org are reporting on exploit code that has been released that takes advantage of an unpatched Internet Explorer vulnerability. According to the Sans institute diary entry... they have tested the exploit......
  • The "secure software" dilemma It's quite a dilemma when a software product is billed as more secure than another.... several days back when Mozilla Firefox released v. 1.5.0.4 which fixed a number of security issues, I saw someone comment "I thought firefox was supposed to be secure." I think there's a misunderstanding when it......
Blog Traffic Exchange Related Websites
  • Link Building - How To Deal With This Thing Do you want to know the nuts and bolts about link building business? I wonder you still do not know how to deal with this kind of business. But in the opposite way – there are no quality issues which are able to give you what you want. Be sure......
  • Great Debate: Bonds vs. Bond Funds Ladies and Gentlemen, financial fight enthusiasts of all ages, welcome to tonight's event. We are moments away from our main event, a bout that will go down in history and settle one of the great debates in finance once and for all, the argument over whether buying individual bonds or......
  • Malware found in Lenovo software package Hii, I just got the news. Computer maker Lenovo is shipping a malware-infected software package to Windows XP users, according to warning from anti-virus researchers at Microsoft. The malicious file was identified by Microsoft as Win32/Meredrop, a Trojan dropper that is used to install and execute multiple malicious executables on......
en.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site