Discussion:
Firefox Remote Compromise Leaked
(too old to reply)
Jason Coombs
2005-05-08 08:14:48 UTC
Permalink
So apparently, the secret is out. I wish that this could have been used
for good purposes but I guess that just isn't possible these days...
What 'good purposes' did you have in mind?

What higher purpose is there above full disclosure with a proof of
concept? Disclosure spreads awareness, and awareness allows defense.

The secret is no longer a secret, and it didn't remain one as long as
you had hoped it would. This reduces the chances that the secret will be
exploited against people who aren't aware that there is a secret.
Nothing at all would have been gained by delaying disclosure, other than
to give attackers a bigger window of opportunity to mount successful
attacks and design new exploits that will launch successfully against a
completely unprepared computing public.

Your belief that you could keep a secret, or that you have any right to
keep such a secret even if you could, is moronic and it's wrong-headed.

Sincerely,

Jason Coombs
***@science.org
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Vincent van Scherpenseel
2005-05-08 09:02:24 UTC
Permalink
Post by Jason Coombs
Nothing at all would have been gained by delaying disclosure, other than
to give attackers a bigger window of opportunity to mount successful
attacks and design new exploits that will launch successfully against a
completely unprepared computing public.
Most of the time disclosure is delayed to allow the vendor to fix a security
bug. If you find a security bug and give the vendor five days to fix it
before you release the disclosure advisory there's a smaller chance that the
vulnerability will be exploited by malicious people.

Full disclosure works because it forces vendors to actually fix a security
problem, and delaying a disclosure for a couple of days doesn't hurt that way
of working.

- Vincent van Scherpenseel
--
http://vincent.vanscherpenseel.nl/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Bipin Gautam
2005-05-08 14:49:26 UTC
Permalink
Looking at the current record, what makes you guys think firefox won't
beat IE 6 for security holes. (o;
---
Bipin Gautam
http://bipin.sosvulnerable.net/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Eric Paynter
2005-05-09 22:08:33 UTC
Permalink
Post by Bipin Gautam
Looking at the current record, what makes you guys think firefox won't
beat IE 6 for security holes. (o;
According to secunia.com:

IE 6.x has had 80 advisories, of which 42% (34 advisories) were rated
highly or extremely critical, and 3 critical advisories are still
unpatched after several months.

Firefox 1.x has had 16 advisories, of which 19% (3 advisories) were rated
highly or extremely critical, and only 1 critical advisory is still
unpatched, but it's only been in that state for a few days, and a patch is
on its way.

Soon, we will once again have no unpatched critical vulnerabilities with
Firefox, and we will still have three or more with IE.

I still like my odds with Firefox.

-Eric

--
arctic bears - email and dns services
http://www.arcticbears.com

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Mary Landesman
2005-05-09 23:46:38 UTC
Permalink
Well, that's one way to crunch the numbers.

Of course, IE 6 has been out since 2001, Firefox 1.x was released three
years later. Looking at the advisories on a timeframe basis for 2005,
Firefox 1.x has had 12 Secunia advisories compared to 6 for IE 6. In other
words, the odds you're banking on shift quite a bit depending on how you
look at it.

-- Mary

----- Original Message -----
From: "Eric Paynter" <***@arcticbears.com>
To: <full-***@lists.grok.org.uk>
Sent: Monday, May 09, 2005 6:08 PM
Subject: Re: [Full-disclosure] Firefox Remote Compromise Leaked
Post by Bipin Gautam
Looking at the current record, what makes you guys think firefox won't
beat IE 6 for security holes. (o;
According to secunia.com:

IE 6.x has had 80 advisories, of which 42% (34 advisories) were rated
highly or extremely critical, and 3 critical advisories are still
unpatched after several months.

Firefox 1.x has had 16 advisories, of which 19% (3 advisories) were rated
highly or extremely critical, and only 1 critical advisory is still
unpatched, but it's only been in that state for a few days, and a patch is
on its way.

Soon, we will once again have no unpatched critical vulnerabilities with
Firefox, and we will still have three or more with IE.

I still like my odds with Firefox.

-Eric

--
arctic bears - email and dns services
http://www.arcticbears.com

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Eric Paynter
2005-05-10 00:24:26 UTC
Permalink
Post by Mary Landesman
Well, that's one way to crunch the numbers.
Of course, IE 6 has been out since 2001, Firefox 1.x was released three
years later. Looking at the advisories on a timeframe basis for 2005,
Firefox 1.x has had 12 Secunia advisories compared to 6 for IE 6. In other
words, the odds you're banking on shift quite a bit depending on how you
look at it.
Ah, but new releases always have more bugs, which are supposed to get
ironed out over time. I guess for a more accurate look at the overall
quality of the release, compare IE in its first six months to Firefox in
it's first six months... I get 12 advisories (2 highly critical) for
Firefox and 18 advisories (7 highly critical) for IE in that time period.
It still looks to me like the future is safer with Firefox.

OK, so next you'll say "but Firefox didn't have the same market share when
it first came out. Now that people are using it, the numbers of found
vulnerabilities will go up..."

Well, I guess it's just a game of numbers at this point. But the fact is,
I feel more secure with Firefox because they actively work with the
community to fix the problems. The team seems to really care and take
pride in the quality of their work. I somehow don't think we'll ever see
something like "Microsoft MCIWNDX.OCX ActiveX Plugin Buffer Overflow"
rated highly critical and still not patched almost two years after the
announcement, or "Windows Explorer / Internet Explorer Long Share Name
Buffer Overflow", also rated highly critical and over a year old with no
patch available. If we did have things like that start happening, I'd bail
off of Firefox pretty quickly. But for now, they've been very responsive,
and that makes me feel more secure.

To each his or her own...

-Eric

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Mary Landesman
2005-05-10 02:54:52 UTC
Permalink
I find security in understanding how best to secure a browser, rather than
switching to whichever one advertises the least vulnerabilities regardless
of how open that interpretation might be.

My point is that crunching numbers reveals different results, depending
solely on the desired outcome. One could equally argue that Firefox had the
advantage of learning from IE's mistakes, hence comparing the first six
months of a browser three years later becomes a moot point. But, of course,
if one were to make that argument, one would expect Firefox to have done
better in the previous six months, which it clearly has not.

Regards,
-- Mary

----- Original Message -----
From: "Eric Paynter" <***@arcticbears.com>
To: <full-***@lists.grok.org.uk>
Sent: Monday, May 09, 2005 8:24 PM
Subject: Re: [Full-disclosure] Firefox Remote Compromise Leaked
Post by Mary Landesman
Well, that's one way to crunch the numbers.
Of course, IE 6 has been out since 2001, Firefox 1.x was released three
years later. Looking at the advisories on a timeframe basis for 2005,
Firefox 1.x has had 12 Secunia advisories compared to 6 for IE 6. In other
words, the odds you're banking on shift quite a bit depending on how you
look at it.
Ah, but new releases always have more bugs, which are supposed to get
ironed out over time. I guess for a more accurate look at the overall
quality of the release, compare IE in its first six months to Firefox in
it's first six months... I get 12 advisories (2 highly critical) for
Firefox and 18 advisories (7 highly critical) for IE in that time period.
It still looks to me like the future is safer with Firefox.

OK, so next you'll say "but Firefox didn't have the same market share when
it first came out. Now that people are using it, the numbers of found
vulnerabilities will go up..."

Well, I guess it's just a game of numbers at this point. But the fact is,
I feel more secure with Firefox because they actively work with the
community to fix the problems. The team seems to really care and take
pride in the quality of their work. I somehow don't think we'll ever see
something like "Microsoft MCIWNDX.OCX ActiveX Plugin Buffer Overflow"
rated highly critical and still not patched almost two years after the
announcement, or "Windows Explorer / Internet Explorer Long Share Name
Buffer Overflow", also rated highly critical and over a year old with no
patch available. If we did have things like that start happening, I'd bail
off of Firefox pretty quickly. But for now, they've been very responsive,
and that makes me feel more secure.

To each his or her own...

-Eric

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
bkfsec
2005-05-10 20:33:03 UTC
Permalink
Post by Mary Landesman
I find security in understanding how best to secure a browser, rather than
switching to whichever one advertises the least vulnerabilities regardless
of how open that interpretation might be.
My point is that crunching numbers reveals different results, depending
solely on the desired outcome. One could equally argue that Firefox had the
advantage of learning from IE's mistakes, hence comparing the first six
months of a browser three years later becomes a moot point. But, of course,
if one were to make that argument, one would expect Firefox to have done
better in the previous six months, which it clearly has not.
Of course, you could also make the argument that Microsoft could have
learned from Netscape and Mosaic when it bought the mess which became IE
from Spyglass.

So that door swings both ways.

Not to mention that you're not talking about the same kinds of mistakes
in firefox versus those in IE in all instances. Many of the flaws in IE
come from its poorly planned position within MS Windows as an Operating
System component. (Before people jump on me - I'm referring to its
place in the interface. I'm well aware that it is not part of the
Windows Kernel and that you can, if you intend to break a large number
of programs, remove IE completely with enough work.) What kind of
lessons would Firefox learn from IE's zoning issues? It wouldn't... and
any argument that it would is specious at best.

Listen, there are no perfect programs. All programs will have bugs. If
you track the statistics, you can play games with the numbers until
you're blue in the face. However, what we can say is this:

- Firefox has, at this moment, only 1 quasi-functional unpatched
hole while IE has 3 completely unpatched holes.
- Firefox is not part of the OS interface and, as such, does not
implement poorly concieved zoning interfaces.

Mozilla/Firefox are designed the way that browsers should ideally be
designed. Some of the holes found in Firefox rely on external programs
(like Java) to do their dirty work and some of them are in the web
standards and equally apply to IE.

Those are the facts, statistics be damned and firefox still wins.

-Barry




_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Georgi Guninski
2005-05-10 17:51:38 UTC
Permalink
Post by Eric Paynter
IE 6.x has had 80 advisories, of which 42% (34 advisories) were rated
if memory serves me right, some windoze service packs drastically changed the
behaviour of some private pages and emails, so number of advisories != number
of fixed public bugs.
--
where do you want bill gates to go today?

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
m***@kc.rr.com
2005-05-08 18:20:50 UTC
Permalink
Post by Jason Coombs
What 'good purposes' did you have in mind?
What higher purpose is there above full disclosure with a proof of
concept? Disclosure spreads awareness, and awareness allows defense.
Disclosure spreads awareness, that most certainly is undisputable.
However, in addition to allowing defense, awareness also reduces the
difficulty of exploitation. This is the only problem with *true* full
disclosure -- that of balancing the user's right to defend him or herself
with the implicit threat that disclosure is to those who aren't defended.

Security as a practice lacks two things today that are necessary for Full
Disclosure to be viable. Protection (or, defense, as you put it), needs to
be *equal* and *immediate* (or as close to it as possible).

In an idealistic world, full disclosure is a great concept. It's a lot
like socialism. It's held back by the fact that the world we live in and
the people we live in it with are not ideal.

For full disclosure to be effective, disclosure should result in the almost
immediate remediation of the vulnerability with virtually zero visible
side-effects. If we had a seamless system of disclosure and remediation,
software updates would be a non-necessity. Software could simply receive
updated threat data as it was made available, and block threats as they
were discovered, using *existing* code (much the same way an IDS uses
signatures, but on an application level, blocking behavior rather than
filtering raw data). We've made huge progress in this area, with products
like SecureIIS, URLScan, etc., being able to block some attacks
heuristically -- even *before* they're known. But, the fact is, most
applications are still in the dark. No such technology exists for clients,
because the data they process is much more varied.

Right now, most users are sitting ducks if I announce a vulnerability
before the vendor has patched it (particularly in client software like IE
or Firefox). For full disclosure to be effective at protecting users, this
has to change. The technology to protect them must be created, users must
be informed, and it must be easily accessible. Preferrably, the security
technology should be embedded into the product itself.

Idealism is fine, when you're setting goals. However, it's not acceptable
for everyday policy decisions. I don't practice full disclosure. I *DO*
allow vendors time to patch. I *DO* believe that critical infrastructure
should be protected before vulnerability information is unleashed to the
script kiddies. However, I do this only by necessity.

Ideally, security will someday cease to be a business -- because every user
will be sufficiently empowered to secure his or her own systems. Right
now, though, no such world exists. My disclosure policies are tempered by
the fact that without vendor response (and sometimes, even with it), the
largest portion of the affected user base will remain unprotected. If we
can make the link tighter between disclosure and solution, then the
decision for the ideal world (that of informing the user) will also be the
sound decision for the real world.
Post by Jason Coombs
The secret is no longer a secret, and it didn't remain one as long as
you had hoped it would. This reduces the chances that the secret will be
exploited against people who aren't aware that there is a secret.
The fact that the secret is now public reduces the chances that it will be
exploited against people who now know there *was* a secret. However, it
simultaneously increases the risk of exploitation against those who aren't
aware that such a "secret" existed. Unfortunately, that now means that a
few users are better protected, and a greater number are now at greater
risk.
Post by Jason Coombs
Nothing at all would have been gained by delaying disclosure, other than
to give attackers a bigger window of opportunity to mount successful
attacks and design new exploits that will launch successfully against a
completely unprepared computing public.
...and to protect those users who have no usable or identifiable avenue of
protection outside of vendor-supplied software updates.
Post by Jason Coombs
Your belief that you could keep a secret, or that you have any right to
keep such a secret even if you could, is moronic and it's wrong-headed.
No offense intended, but if anything here is moronic, it is the blind
adherence to idealism expressed by this statement. While I agree it is a
difficult decision to make to keep a secret from a user to protect him from
another, it is a decision that must be made, given how threats are (not)
handled today.

By announcing every vulnerability found as soon as it is discovered, we end
up with a user-base at a generally increased risk. Yes, some users are
protected, but the overwhelming majority are more vulnerable. While there
is a time when keeping a secret is no longer justified by the desire to
protect users (such as times where it is apparent that the vendor will not
be releasing an update in the near future -- a timeline up to
interpretation), granting a vendor some time following the discovery of a
vulnerability to identify and solve it is widely known to increase the
security of the user base as a whole more than immediate disclosure (which
may actually decrease it).

We're not talking about keeping such a secret for a lifetime, only a matter
of weeks at most. It was certainly feasible, and the damage done by
failing to keep that secret is no more (and is probably less) than the
damage done by not attempting, and releasing the information immediately.
Awareness and threat are most definitely *NOT* zero sum in today's world.

As for the right of the discoverer to keep a secret... we wouldn't be
having this discussion if a secret had been kept. As for the policy of
notifying vendors, the courts of law and public opinion have ruled against
you. Researchers have every right and (in today's circumstances) an
ethical obligation to do so. In a scenario such as this where users had
the choice to "protect" themselves by crippling their browser, the decision
was certainly logical, and most certainly within the researcher's right.

There's something else at work here, it's called innovation. Receiving
credit and right to one's own discovery inspires one to keep producing such
discoveries. Without that basic notion of intellectual property,
technological innovations that have made many people's lives better (and
made this debate possible) would not be here. When you look at it from the
angle of protecting yourself by getting consistently better information,
it's not as appealing to willingly trample the intellectual property rights
of others.

But I shouldn't be surprised by that, after all, you are the one who
remarked "so sue me" in response to substantiated allegations of piracy
against you:

http://lists.grok.org.uk/pipermail/full-disclosure/2005-April/033111.html

Before we get into the rhetoric, let's put idealism aside and have a little
balance.

Regards,
Matthew Murphy

--------------------------------------------------------------------
mail2web - Check your email from the web at
http://mail2web.com/ .


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Steve Friedl
2005-05-08 19:35:01 UTC
Permalink
Post by Jason Coombs
Your belief that you could keep a secret, or that you have any right to
keep such a secret even if you could, is moronic and it's wrong-headed.
One can discuss the pro and con of full disclosure all day and not reach
any consensus (though *this* forum won't be an even distribution), it is
another matter entirely to believe that one does not own his own discoveries.

I can have an opinion about how you should disclose, I can certainly try
to persuade you, but I do not have any *claim* to your private discoveries.


Steve
--
Stephen J Friedl | Security Consultant | UNIX Wizard | +1 714 544-6561
www.unixwiz.net | Tustin, Calif. USA | Microsoft MVP | ***@unixwiz.net
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Loading...