Mozilla confirmed the first security vulnerability in Firefox 3.5 and said that the bug could be used to hijack a machine running the company's newest browser.
A noted Firefox contributor called the situation “self-inflicted” and said it was likely that the hacker who posted public exploit code Monday became aware of the flaw by rooting through Bugzilla, Mozilla's bug- and change-tracking database.
Older versions of Firefox, including Firefox 3.0, are not vulnerable, according to a message posted by Asa Dotzler, Mozilla's director of community development, in a comment to the company's blog.
“Mozilla developers are working on a fix for this issue, and a Firefox security update will be sent out as soon as the fix is completed and tested,” said that same blog.
The hacker who published exploit code on the Milw0rm.com malware site Monday was not the first to uncover the vulnerability: Mozilla developers first noted the flaw last Thursday and were in the middle of working on it when the attack code appeared.
“Looking at the exploit code and our test cases, I think this is self-inflicted and we should have hidden the bug earlier,” argued Andreas Gal on Bugzilla. Gal is a project scientist at the University of California, Irvine, where the technique called “trace trees” was developed. Firefox 3.5's TraceMonkey engine is based on that technique, and builds on code and ideas shared with the open-source Tamarin Tracing project.
Another contributor agreed. “It would seem that the Milw0rm exploit code is based on the test cases for this bug,” said someone identified only as “WD” in the same Bugzilla thread. “When you look at the crash details in a debugger, it's pretty clear that it's exploitable with a heap spray to the access violation address in question.”
The fix has been slated for Firefox 3.5.1, a fast-track update that was originally set to be released in the last two weeks of this month.
That update will be accelerated to plug the just-gone-public hole, said Daniel Veditz, a security lead at Mozilla. “[The bug] was checked in yesterday, a few hours before we learned of the Milw0rm posting,” Veditz said Tuesday night in a comment on the Mozilla security blog. “This fix was going to be in the 3.5.x update we had scheduled for the end of July, but obviously now we have moved up the schedule for release.”