ciphergoth: (Default)
[personal profile] ciphergoth
If you are running Firefox, Thunderbird or Mozilla under Windows, you need this patch right away or you will still be vulnerable to remote exploit. Users of other operating systems are not affected; the vulnerability is in Windows, but Firefox has been patched to work around it.

If you have just gone through the inconvenience of installing Firefox because of the vulnerability in IE, my heart goes out to you. I hope you'll take comfort in the fact that a fix for this problem is already available in Firefox and Mozilla (within a day of the exploit being published), while it seems there is still no effective fix for the problem in IE, so you still made the right choice.
From: [identity profile] deliberateblank.livejournal.com
Hmm. Cross-protocol exploits were well-known in IE in September 2002.

I think there's definitely an argument here for not allowing any protocol i) you don't fully understand or control the consequences of using, or ii) the user hasn't specifically enabled.

(A base set of http:, https:, ftp:, mailto:, news:, file: and javascript: ought to be enough for 99% of users.)
From: [identity profile] stgpcm.livejournal.com
personally, I think the problem lies with whoever thought registering a 'shell:' handler was a good idea.

installing an inernal stub handler for 'shell:' is technically bad, but definately the right thing to do.

From: [identity profile] deliberateblank.livejournal.com
I can see it being useful for some intranet applications. And dangerous for (untrusted) internet use.

To deny its existence (which would have to be done by disallowing any extensibility in the protocol handler namespace - anyone can create a new protocol handler which could potentially also be abused) is not a practical option because it limits legitimate implementation of valuable functionality.

The key is ensuring that powerful features like this operate with very strict security restrictions, and/or are available only to callers that are trusted. Clearly this has not been done.
From: [identity profile] ciphergoth.livejournal.com
If you follow the bug, you'll find a debate among Firefox developers about whether whitelisting or blacklisting was most appropriate for protocol handlers. Blacklisting won out: the argument is that the whole *point* of having protocol handlers was so that the browser could defer to them if it didn't recognise a protocol. Whitelisting turns out to be the right thing: the argument is that the Windows security people couldn't pour piss from a boot if the instructions were written on the sole.

Profile

ciphergoth: (Default)
Paul Crowley

January 2025

S M T W T F S
   1234
5678 91011
12131415161718
19202122232425
262728293031 

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jan. 22nd, 2026 11:39 pm
Powered by Dreamwidth Studios