Author Topic: First big Firefox 1.5 vulnerability and workarounds  (Read 8576 times)

0 Members and 1 Guest are viewing this topic.

Offline szc

  • Avast Evangelist
  • Starting Graphoman
  • ***
  • Posts: 6927
MB: GIGABYTE GA-Z77X-UD3H Intel 7 Series  - LGA1155, CPU: Intel Core i5-3570K - Quad Core, 3.40GHz (3.80GHz Max Turbo), CPU COOLER: Cooler Master Hyper 212 EVO Direct Heat Pipe R2, RAM: 16 GB Kingston HyperX Blu DDR3, VIDEO CARD: Galaxy GeForce GTX 560 Ti - 1GB, GDDR5, POWER SUPPLY: Corsair Enthusiast Series TX750 V2 - 750 Watts, HD: Seagate Barracuda - 2TB, 7200RPM, 64MB, SATA 6Gb/s

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34065
  • malware fighter
Re: First big Firefox 1.5 vulnerability and workarounds
« Reply #1 on: December 10, 2005, 11:55:36 PM »
Hello Sasza,


Apparently they have an awful lot of trouble to replicate the bug, see here: http://it.slashdot.org/article.pl?sid=05/12/08/2146238&threshold=-1&tid=154&tid=218

greets,

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline szc

  • Avast Evangelist
  • Starting Graphoman
  • ***
  • Posts: 6927
Re: First big Firefox 1.5 vulnerability and workarounds
« Reply #2 on: December 11, 2005, 12:30:23 AM »
I'm just a messenger, please don't shot me  ;D  ;D  ;D

Btw, that Flock looks really nice... does it work that way too ? I am interested just don't have enough time to play with it right now...
MB: GIGABYTE GA-Z77X-UD3H Intel 7 Series  - LGA1155, CPU: Intel Core i5-3570K - Quad Core, 3.40GHz (3.80GHz Max Turbo), CPU COOLER: Cooler Master Hyper 212 EVO Direct Heat Pipe R2, RAM: 16 GB Kingston HyperX Blu DDR3, VIDEO CARD: Galaxy GeForce GTX 560 Ti - 1GB, GDDR5, POWER SUPPLY: Corsair Enthusiast Series TX750 V2 - 750 Watts, HD: Seagate Barracuda - 2TB, 7200RPM, 64MB, SATA 6Gb/s

Offline DavidR

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 89687
  • No support PMs thanks
Re: First big Firefox 1.5 vulnerability and workarounds
« Reply #3 on: December 11, 2005, 12:55:18 AM »
This sounds like it should also have an effect on earlier versions of firefox, not just 1.5. I personally can't see why this would only effect 1.5 as the other versions also have history.dat.
Windows 10 Home 64bit/ Acer Aspire F15/ Intel Core i5 7200U 2.5GHz, 8GB DDR4 memory, 256GB SSD, 1TB HDD - 27" external monitor 1440p 2560x1440 resolution - avast! free  24.9.6130 (build 24.9.9452.762) UI 1.0.818/ Firefox, uBlock Origin Lite, uMatrix/ MailWasher Pro/ Avast! Mobile Security

Offline szc

  • Avast Evangelist
  • Starting Graphoman
  • ***
  • Posts: 6927
Re: First big Firefox 1.5 vulnerability and workarounds
« Reply #4 on: December 11, 2005, 01:14:57 AM »
I have no clue, but I know they mentioned that just because they wanted to point our attention that if the same problem existed before, sure it's not solved in so much advertised version 1.5

Maybe that's the reason they brought it out, I am not quite sure though...
MB: GIGABYTE GA-Z77X-UD3H Intel 7 Series  - LGA1155, CPU: Intel Core i5-3570K - Quad Core, 3.40GHz (3.80GHz Max Turbo), CPU COOLER: Cooler Master Hyper 212 EVO Direct Heat Pipe R2, RAM: 16 GB Kingston HyperX Blu DDR3, VIDEO CARD: Galaxy GeForce GTX 560 Ti - 1GB, GDDR5, POWER SUPPLY: Corsair Enthusiast Series TX750 V2 - 750 Watts, HD: Seagate Barracuda - 2TB, 7200RPM, 64MB, SATA 6Gb/s

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34065
  • malware fighter
Re: First big Firefox 1.5 vulnerability and workarounds
« Reply #5 on: December 11, 2005, 02:35:28 AM »
Hi Sasza,

Try that Flock. I have it since the preview was out. It is so stable and fast, haven't seen any  browser like it. It was developed by good coders, that got a milion from Bessemer's to develop it.
I am beta testing their security. Waiting for the Dr. Web plug-in coming in. Add-ons in it: Dom Inspector, Adblock Plus G., NoScript, Cookie Culler, Nuke Anything (ported this myself with PtoF), Linkification, All text for links, Web Developer, Translate Page.
Various security search engines in ConQuery. Your ConQuery file you can copy as such from Firefox to Flock, no sweat. Try it, you will be amazed, and download the nightly if you do not belong to the fainthearted. It is a developers' edition, but I find it better than the official editions of FF, I have seen. Oh and the Firefox always start to connect to google.com, while Flock tries to contact web.roundtwo,com.

Have a nice day,

polonus
« Last Edit: December 11, 2005, 02:41:12 AM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline Lisandro

  • Avast team
  • Certainly Bot
  • *
  • Posts: 67183
Re: First big Firefox 1.5 vulnerability and workarounds
« Reply #6 on: December 11, 2005, 02:43:54 AM »
But I find it better than the official editions of FF, I have seen.
Me too... Flock in this stage is, for me, better than Firefox ever.
The best things in life are free.

Offline DavidR

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 89687
  • No support PMs thanks
Re: First big Firefox 1.5 vulnerability and workarounds
« Reply #7 on: December 11, 2005, 02:54:57 AM »
Interesting one for you, I just installed the DrWeb extension for firefox 1.5. I was experiencing lots of hassle with updating extensions or installing them in ff 1.5. I visited the firefox forums to see if this was a common problem and no sign of it being a problem.

On the unsuccessful extension updates or installs it kept mentioning check the JavaScript consol, I could see lots of errors relating to parameters, etc. and it took ages to twig, NoScript. It was effectively blocking the extensions being installed or updated, when disabled, the DrWeb extension installed fine (nice to have it back). So watch out if using NoScript in firefox 1.5 and getting extensions.
Windows 10 Home 64bit/ Acer Aspire F15/ Intel Core i5 7200U 2.5GHz, 8GB DDR4 memory, 256GB SSD, 1TB HDD - 27" external monitor 1440p 2560x1440 resolution - avast! free  24.9.6130 (build 24.9.9452.762) UI 1.0.818/ Firefox, uBlock Origin Lite, uMatrix/ MailWasher Pro/ Avast! Mobile Security

Umath

  • Guest
Re: First big Firefox 1.5 vulnerability and workarounds
« Reply #8 on: December 11, 2005, 07:34:49 AM »
To work around the flaw, which is not called vulnerability now, marking history.dat file as read-only would work as well.  Personally, I use bookmarks and don't need Mozilla to record the history.

But I find it better than the official editions of FF, I have seen.
Me too... Flock in this stage is, for me, better than Firefox ever.

Nice to see Flock seems to be promising, which offers another option.   :D

Interesting one for you, I just installed the DrWeb extension for firefox 1.5. I was experiencing lots of hassle with updating extensions or installing them in ff 1.5. I visited the firefox forums to see if this was a common problem and no sign of it being a problem.

On the unsuccessful extension updates or installs it kept mentioning check the JavaScript consol, I could see lots of errors relating to parameters, etc. and it took ages to twig, NoScript. It was effectively blocking the extensions being installed or updated, when disabled, the DrWeb extension installed fine (nice to have it back). So watch out if using NoScript in firefox 1.5 and getting extensions.

It may be suitable for Firefox users to refrain from updating to 1.5 till their favorite extensions get compatible with 1.5 since this is not a minor update.  If it's not broken...

Offline DavidR

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 89687
  • No support PMs thanks
Re: First big Firefox 1.5 vulnerability and workarounds
« Reply #9 on: December 11, 2005, 03:31:22 PM »
Interesting one for you, I just installed the DrWeb extension for firefox 1.5. I was experiencing lots of hassle with updating extensions or installing them in ff 1.5. I visited the firefox forums to see if this was a common problem and no sign of it being a problem.

On the unsuccessful extension updates or installs it kept mentioning check the JavaScript consol, I could see lots of errors relating to parameters, etc. and it took ages to twig, NoScript. It was effectively blocking the extensions being installed or updated, when disabled, the DrWeb extension installed fine (nice to have it back). So watch out if using NoScript in firefox 1.5 and getting extensions.

It may be suitable for Firefox users to refrain from updating to 1.5 till their favorite extensions get compatible with 1.5 since this is not a minor update.  If it's not broken...
Well How are they to find that the extensions that are currently disabled in 1.5 (but not uninstalled) without checking for updates. I was regularly checking individual extensions for update and monitoring the home pages of the extension.

My problem was not with the checking for updates, but having NoScript, which compatible with 1.5 and running. It was blocking the java script from being used in the update extensions process.
Windows 10 Home 64bit/ Acer Aspire F15/ Intel Core i5 7200U 2.5GHz, 8GB DDR4 memory, 256GB SSD, 1TB HDD - 27" external monitor 1440p 2560x1440 resolution - avast! free  24.9.6130 (build 24.9.9452.762) UI 1.0.818/ Firefox, uBlock Origin Lite, uMatrix/ MailWasher Pro/ Avast! Mobile Security

Umath

  • Guest
Re: First big Firefox 1.5 vulnerability and workarounds
« Reply #10 on: December 11, 2005, 04:05:03 PM »
My problem was not with the checking for updates, but having NoScript, which compatible with 1.5 and running. It was blocking the java script from being used in the update extensions process.

I see.  Since it is the job of NoScript to block any script which is not allowed and FF extensions need scripts for installation, it is natural for the users should need to exclude some scripts.

I guess my previous comment was prejudiced by Eweek's review on FF 1.5 and the impression when I spotted FF 1.5 RC on your sig while reading the phrase "When it's not broken…" in one of your posts.  ;)

Offline DavidR

  • Avast Überevangelist
  • Certainly Bot
  • *****
  • Posts: 89687
  • No support PMs thanks
Re: First big Firefox 1.5 vulnerability and workarounds
« Reply #11 on: December 11, 2005, 04:12:47 PM »
Yes, there are a number of people (Scot Finnie's newsleter for one) suggesting to wait for the extensions to catch up before making the update to firefox 1.5.

Most of my extensions are working with 1.5 just a few which are disabled because of compatibility so not a deal braker for me.
Windows 10 Home 64bit/ Acer Aspire F15/ Intel Core i5 7200U 2.5GHz, 8GB DDR4 memory, 256GB SSD, 1TB HDD - 27" external monitor 1440p 2560x1440 resolution - avast! free  24.9.6130 (build 24.9.9452.762) UI 1.0.818/ Firefox, uBlock Origin Lite, uMatrix/ MailWasher Pro/ Avast! Mobile Security

Offline MikeBCda

  • Avast Evangelist
  • Super Poster
  • ***
  • Posts: 2246
Re: First big Firefox 1.5 vulnerability and workarounds
« Reply #12 on: December 11, 2005, 06:23:11 PM »
This vulnerability/exploit was brought up over at Wilders a couple of days ago, and there seemed to be agreement that if you have your history set to zero days then there's no history.dat for the thing to mess with.

So that's one more work-around, till Mozilla comes up with a "real" fix.
Intel Atom D2700, 2 gig RAM, Win 7 x64 SP1 & IE-11, Firefox 51.0
(default). 320 gig HD, 15Mb DSL, Win firewall, Avast 12.3.2280 free, SpywareBlaster, MBAM Prem., Crypto-Prevent

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 34065
  • malware fighter
Re: First big Firefox 1.5 vulnerability and workarounds
« Reply #13 on: December 11, 2005, 07:21:13 PM »
Hi MikeBCda,

The new Dr.Web browser plug-in works great for Flock.
The browser at once is a lot safer, when I can scan my hyperlinkies in advance.

greets,

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

neal62

  • Guest
Re: First big Firefox 1.5 vulnerability and workarounds
« Reply #14 on: December 11, 2005, 08:46:05 PM »
Polonus,

I agree with your last post. Works just fine for me with me using Flock also.  :)