Firefox 14 contains vulnerability patches, security-related features
- 18 July, 2012 13:58
Version 14 of the Mozilla Firefox browser, released Tuesday, offers several new security-related features as well as patches for numerous vulnerabilities.
Another critical flaw patched in Firefox 14 could be exploited to bypass the browser's same-compartment security wrappers (SCSW) -- a security feature that prevents a Web page from executing code outside of its context.
A critical memory corruption issue stemming from the way the "JSDependentString::undepend" function converts dependent strings into fixed strings was also addressed. If left unpatched it could be exploited to crash the browser and possibly execute malicious code on the system.
The other two security advisories marked as critical cover six other memory corruption vulnerabilities located in various components that could also lead to the execution of arbitrary code.
The remaining nine advisories, four rated as high and four as moderate, address vulnerabilities that could facilitate cross-site scripting (XSS), clickjacking and phishing attacks, or could allow attackers to steal OAuth 2.0 access tokens and OpenID credentials, trick users into accepting a rogue SSL certificate and conceal a malicious URL.
In addition to addressing numerous vulnerabilities, Firefox 14 also secures Google Web searches by enabling HTTPS for search queries initiated through the location bar, search box or the right-click menu.
"We automatically make your Google searches secure in Firefox to protect your data from potentially prying eyes, like network administrators when you use public or shared WiFi networks," the Mozilla developers said in a blog post on Tuesday. "Google is currently the only search engine that allows Firefox to make your searches private, but we look forward to supporting additional search engines with this feature in the future."
Firefox 14 also comes with simplified URL bar favicons that make it easier for users to determine the level of connection security supported by different websites.
Non-HTTPS websites will have a grey globe icon displayed in front of their URL, HTTPS websites will have a grey lock icon displayed, while HTTPS websites that use an EV (Extended Validation) certificate will have a green lock icon together the name of the certificate's owner displayed in the URL bar.
Another security-related feature in Firefox 14 is the opt-in activation for plug-ins. Also known as "click to play," this feature requires user approval for the playback of plug-in based content like Flash or Java when it is enabled.
The feature is still a work in progress, so for now it can only be enabled by manually setting a flag in "about:config" -- it can't be turned on from the browser's "Options" dialog.
The non-security related features in Firefox 14 include full screen support for Mac OS X Lion, Awesome Bar auto-complete for typed URLs and support for Pointer Lock API, an application programming interface that will give Web apps and games better control over the mouse.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- The Growing Cost of Cyber Crime
- Print intelligently; Control, Save and Conserve
- Securing the Road to Virtualization and Beyond
- Cloud without Fog - Getting Real Service Visibility in a Cloud Environment
- Analyst Paper - The Total Economic Impact To IBM WebSphere Application Server Migrating From An Open Source Environment
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
HP Helps NEC Reduce Network Management Costs and Gain Efficiencies
NEC wanted to reduce network management costs, while increasing network visibility, decreasing mean-time-to-repair, improving stability and mitigating the risk of downtime. Download today to hear from Cameron Craig, Senior department manager of NEC on what approach they took and why.
Implementing A Security Analytics Architecture
According to the 2012 Verizon Data Breach Investigations report, 99% of breaches led to data compromise within “days” or less, whereas 85% of breaches took “weeks” or more to discover. This presents a significant challenge to security teams as it grants attackers extended periods of time within a victim’s environment. More “free time” leads to more stolen data and more digital damage. Principally, this is because today’s security measures aren’t designed to counter today’s more advanced threats. Read on.
Deploying Flash in the Enterprise
Flash is quickly emerging as the preferred way to overcome the nagging performance limitations of hard disk drives. However, because flash comes at a significant price premium, outright replacement of HDDs with flash only makes sense in situations in which capacity requirements are relatively small and performance requirements are high. Learn how deployment approaches-including hybrid storage arrays, server flash, and all-flash arrays-that combine the performance of flash with the capacity of HDDs can be cost effective for a broad range of performance requirements.