Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Firefox tops list of 12 most vulnerable apps

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
RedEarth Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 10:05 PM
Original message
Firefox tops list of 12 most vulnerable apps
Edited on Tue Dec-16-08 10:07 PM by RedEarth
December 15th, 2008
Firefox tops list of 12 most vulnerable apps
Posted by Ryan Naraine @ 10:41 am



Mozilla’s flagship Firefox browser has earned the dubious title of the most vulnerable software program running on the Windows platform.

According to application whitelisting vendor Bit9, Firefox topped the list of 12 widely deployed desktop applications that suffered through critical security vulnerabilities in 2008. These flaws exposed millions of Windows users to remote code execution attacks.

The other applications on the list are all well-known and range from browsers to media players, to VOIP chat and anti-virus software programs. Here’s Bit9’s dirty dozen:


Mozilla Firefox: In 2008, Mozilla patched 10 vulnerabilities that could be used by remote attackers to execute arbitrary code via buffer overflow, malformed URI links, documents, JavaScript and third party tools.

Adobe Flash and Adobe Acrobat: Bit9 listed 14 flaws patched this year that exposed desktops of arbitrary remote code execution via buffer overflow,“input validation issues” and malformed parameters.

EMC VMware Player,Workstation and other products: A total of 10 bugs introduced risks ranging from privilege escalation via directory traversal, ActiveX buffer overflows leading to arbitrary code execution and denial of service.

Sun Java JDK and JRE, Sun Java Runtime Environment (JRE):
Inability to prevent execution of applets on older JRE release could allow remote attackers to exploit vulnerabilities of these older releases. Buffer overflows allowing creation, deletion and execution of arbitrary files via untrusted applications. 10 patched vulnerabilities listed.

Apple QuickTime, Safari and iTunes: In QuickTime, the list includes nine vulnerabilities that allow remote attackers to execute arbitrary code via buffer overflow, or cause a denial of service (heap corruption and application crash) involving malformed media files, media links and third party codecs. The Safari for Windows browser was haunted by three flaws that could be lead to arbitrary code execution and denial of service involving JavaScript arrays that trigger memory corruption. Apple’s iTunes software was susceptible to a remote improper update verification that allowed man-in-the-middle attacks to execute arbitrary code via a Trojan horse update.

Symantec Norton products (all flavors 2006 to 2008): Stack-based buffer overflow in the AutoFix Support Tool ActiveX exposed Windows users to arbitrary code execution.

Trend Micro OfficeScan: A total of four stack-based buffer overflows that opened doors for remote attackers to execute arbitrary code.

Citrix Products: Privilege escalation in DNE via specially crafted interface requests affects Cisco VPN Client, Blue Coat WinProxy, SafeNet SoftRemote and HighAssurance Remote. Search path vulnerability, and buffer overflow lead to arbitrary code execution.

Aurigma Image Uploader, Lycos FileUploader: Remote attackers can perform remote code execution via long extended image information.

Skype: Improper check of dangerous extensions allows user-assisted remote attackers to bypass warning dialogs.Cross-zone scripting vulnerability allows remote attackers to inject script via Internet Explorer web control.

Yahoo Assistant: Remote attackers can execute arbitrary code via memory corruption.

Microsoft Windows Live (MSN) Messenger: Remote attackers are allowed to control the Messenger application, “change state,” obtain contact information and establish audio or video connections without notification.

See Bit9’s full report (.pdf) for information on how the list was put together, including criteria for inclusion.



http://blogs.zdnet.com/security/?p=2304
Printer Friendly | Permalink |  | Top
A-Schwarzenegger Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 10:13 PM
Response to Original message
1. Huh?
:*
Printer Friendly | Permalink |  | Top
 
DainBramaged Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 10:19 PM
Response to Original message
2. Microsoft Windows Live, nice surprise for PC camera buyers
Edited on Tue Dec-16-08 10:21 PM by DainBramaged
it is included with the Microsoft cameras, so as usual, they put out a very complete and safe product. :puke:
Printer Friendly | Permalink |  | Top
 
Hawkeye-X Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 10:20 PM
Response to Original message
3. Ryan Naraine is now a confirmed idiot.
Firefox patches as they go. It's open source, of course, I expect vulnerability.

IE is a big vulnerability that M$ continues to ignore - Fact is that they found a critical hole in IE today - it's so full of holes that it is not even worth it.

Printer Friendly | Permalink |  | Top
 
DainBramaged Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 10:20 PM
Response to Reply #3
4. Swiss cheese for the digital age.
Printer Friendly | Permalink |  | Top
 
thunder rising Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 11:17 PM
Response to Reply #3
19. Nothing will protect a user running MS virus enabled operating system
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 10:22 PM
Response to Original message
5. The listing criteria *excluded* IE from being listed.
It's a list put together by somebody selling software management tools.
Printer Friendly | Permalink |  | Top
 
Hawkeye-X Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 10:27 PM
Response to Reply #5
9. And the author works for Kaspersky..
Not exactly an unbiased report.
Printer Friendly | Permalink |  | Top
 
Ioo Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 10:23 PM
Response to Original message
6. Well looking at the list, May as well just burn your PC, because it is useless without these
Printer Friendly | Permalink |  | Top
 
nc4bo Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 10:23 PM
Response to Original message
7. The comments are umm....interesting. Some even shine some light. nt


Printer Friendly | Permalink |  | Top
 
StudsT Donating Member (310 posts) Send PM | Profile | Ignore Tue Dec-16-08 10:25 PM
Response to Original message
8. i was wondering how IE escaped that 1 list...
The applications on this list meet the following criteria.

6) The application cannot be automatically
and centrally updated via free Enterprise
tools such as Microsoft SMS & WSUS.



i believe most popular open-source projects respond more quickly to security threats (and other issues) than the big boyz... at least that has been my experiance.

t
Printer Friendly | Permalink |  | Top
 
nc4bo Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 10:31 PM
Response to Reply #8
11. and here's another POV
http://www.bmighty.com/blog/main/archives/2008/12/most_vulnerable.html



The essence of Bit9's methodology is straightforward: the programs have to run under Windows and be difficult to patch automatically. (Most of the Vulnerabilities the company identifies have long had patches available.)

In other words, the most vulnerable apps are also apps whose vulnerabilities could be mitigated by a dose of application whitelisting.

Nothing wrong in that -- Bit9 is admittedly and openly marketing its services.

What makes the list most interesting for small and midsized businesses is the nature of some of the products Bit9 identifies: image uploaders (Aurigama and Lycos), music players (iTunes) and Net phone (Skype.) Apps with business uses, sure, but also products that employees may be adding to your system on their own.

And that's the great reminder here: whether or not you turn control of your systems over to an outside service, you need to know everything that's being run in your company.

Especially the apps you haven't authorized.


Printer Friendly | Permalink |  | Top
 
Joe the Liberal Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 10:28 PM
Response to Original message
10. Ummmmm........I use Firefox.....
should I be worried? is that what the article is trying to imply?
Printer Friendly | Permalink |  | Top
 
StudsT Donating Member (310 posts) Send PM | Profile | Ignore Tue Dec-16-08 10:37 PM
Response to Reply #10
12. not as long as you keep it up to date - and if you are on a mac you can relax even more
as there aren't nearly as many attacks designed for macs... thats' one of the main reasons that i insist my family all run macs... if i gotta fix'm i get to chose the platform ;)

StudsT
Printer Friendly | Permalink |  | Top
 
Joe the Liberal Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 10:41 PM
Response to Reply #12
13. Ok good......
It actually updated today and yea I heard macs are safer but I just could never get used to a Mac. The whole set up is weird to me, I guess I've always used a PC so that's just what I'm used to.
Printer Friendly | Permalink |  | Top
 
StudsT Donating Member (310 posts) Send PM | Profile | Ignore Tue Dec-16-08 10:46 PM
Response to Reply #13
16. i hear ya about being used to doing what you are doing, OS change is a big deal
and as long as you stay on top of your updates with MS you should be good, too =)

StudsT
Printer Friendly | Permalink |  | Top
 
IDemo Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 10:43 PM
Response to Reply #12
15. Or on Linux
Printer Friendly | Permalink |  | Top
 
dbonds Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 10:41 PM
Response to Original message
14. Beyond stupid list.
Seems beyond stupid to call something the most vulnerable by how many critical patches it has released. The most vulnerable probably doesn't even patch the holes. Firefox releases patches regularly and if you use it you get the patch. And by the list definition it doesn't include any MS Apps which have the worst track record of having vulnerabilities and not getting them patched.
Printer Friendly | Permalink |  | Top
 
cliffordu Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 10:58 PM
Response to Original message
17. Of course, Internet Exploder should be listed first in the piece o' shit software
sweepstakes, followed closely by Outbreak Express...

They should just lump that stuff together and call it 'Microsoft Petri Dish' and get it over with.




Printer Friendly | Permalink |  | Top
 
dweller Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 11:04 PM
Response to Original message
18. Give it to me straight .doc
i'm screwn, right?

dp
Printer Friendly | Permalink |  | Top
 
RoyGBiv Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 11:20 PM
Response to Original message
20. Gee ...

I wonder why this story got pushed today.

Whatever could it be?

I just can't guess.

It's been said before, and it's been ignored before, so I'll say it again and let it be ignored again.

OpenSource software, almost by definition, has a higher rate for patched vulnerabilities, and with active packages backed by a dedicated team of developers, those vulnerabilities (the critical ones) are patched as quickly as possible.

Yes, Firefox has vulnerabilities. Every software package on earth that's more complicated than "Hello, World" has some sort of problem with it, and the vast majority of them aren't patched at all because they have no one working on them. Others, in particular closed source applications, patch infrequently, and many of these packages only fix such problems in subsequent version you end up having to pay for.

The criteria for this is just ridiculous. "Fixed" vulnerabilities somehow equates to "most vulnerable." A different editor might look at this and see one of the top 12 "developer teams most dedicated to fixing critical security flaws."



Printer Friendly | Permalink |  | Top
 
anonymous171 Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 11:23 PM
Response to Original message
21. That's why I use noscript
Printer Friendly | Permalink |  | Top
 
nc4bo Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-16-08 11:25 PM
Response to Reply #21
22. You forgot the link
You know how they do around here anonymous171 :)

http://noscript.net/
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri Apr 26th 2024, 09:14 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC