Mozilla knew of Pwn2Own bug before CanSecWest
Even before a pair of researchers hacked into Firefox to snag second place at the CanSecWest Pwn2Own contest, Mozilla knew about the vulnerability and was working on a fix.
That fix arrived today with Firefox 11, a high-priority update that fixes a dozen security flaws that expose Windows and Mac OS X users to a wide range of hacker attacks.
"The security bug reported by ZDI is one we had already identified and fixed through our internal processes," said Johnathan Nightingale, Senior Director of Firefox Engineering.
[ Researchers hack into newest Firefox with zero-day flaw ]
Mozilla had originally delayed the release of Firefox 11 to wait for the Pwn2Own vulnerability details but once the open-source group realized it was the same issue that was identified by researcher Jeff Walden, the patch was pushed out the door.The vulnerability was described as a "memory safety problem in the array.join
function" and was bundled into a security advisory that carries a critical rating. At Pwn2Own, researchers Willem Pinckaers and Vincenzo Iozzo exploited the flaw to launch a remote code execution attack that required no user action beyond browsing to a rigged web page.
[ SEE: Ten little things to secure your online presence ]
Here's a listing of the vulnerabilities fixed with this Firefox update:- MFSA 2012-19 Miscellaneous memory safety hazards (rv:11.0/ rv:10.0.3 / rv:1.9.2.28)
- MFSA 2012-18 window.fullScreen writeable by untrusted content
- MFSA 2012-17 Crash when accessing keyframe cssText after dynamic modification
- MFSA 2012-16 Escalation of privilege with Javascript: URL as home page
- MFSA 2012-15 XSS with multiple Content Security Policy headers
- MFSA 2012-14 SVG issues found with Address Sanitizer
- MFSA 2012-13 XSS with Drag and Drop and Javascript: URL
- MFSA 2012-12 Use-after-free in shlwapi.dll
Firefox 11 is available for via the browser's software update utility.
ALSO SEE: