Firefox patches two actively exploited 0-day holes: update now! - Hexafusion Blog | Hexafusion
  • Contact Us At

    604-679-2223

  • E-Mail Us @

Hexafusion Blog

Firefox patches two actively exploited 0-day holes: update now!

On Saturday 2022-03-05, Mozilla published Firefox 97.0.2, an “out-of-band” update that closed two bugs officially listed as critical.

Mozilla reports that both of these holes are already actively being exploited, making them so-called zero-day bugs, which means, in simple terms, that the crooks got there first:

We have had reports of attacks in the wild abusing [these] flaw[s].

Access to information about the bugs is still restricted to Mozilla insiders, presumably to make it harder for attackers to get at the technical details of how to exploit these security holes.

Assuming that the existing zero-day exploits are not widely known (these days, true zero-days are often jealously guarded by their discoverers because they’re considered both scarce and valuable), temporarily limiting access to the source code changes does provide some protection against copycat attacks.

As we’ve mentioned many times before on Naked Security, finding and exploiting a zero-day hole when you know where to start looking, and what to start looking for, is very much easier than discovering such a bug from scratch.

Just how urgent Mozilla considered this update can be inferred from the fact that it came out just three days before the next scheduled “in band” update was due anyway.

Indeed, by the time you read this, you may find you’re already on, or being offered, Firefox 98.0, which officially comes out on Tuesday 2022-03-08.

(In-band updates to Firefox are conventionally scheduled to arrive on every fourth Tuesday, rather than on the second Tuesday of each month, like Microsoft’s and Adobe’s Patch Tuesday updates. Every few months, Patch Tuesday and Firefox Tuesday coincide, as they do in March 2022,)

The bugs are listed as:

CVE-2022-26485. Use-after-free in XSLT parameter processing. This bug has apparently already been exploited for remote code exection (RCE), implying that attackers with no existing privileges or accounts on your computer could trick you into running malware code of their choice simply by luring you to an innocent-looking but booby-trapped website. CVE-2022-26486, Use-after-free in WebGPU IPC Framework. This bug has apparently already been exploited for what’s known as a sandbox escape. This sort of security hole can typically be abused on its own (for example, to give an attacker access to files that are supposed to be off limits), or in combination with an RCE bug to allow implanted malware to escape from the security confines imposed by your browser, thus making an already bad situation even worse.

Use-after-free bugs occur when one part of a program signals its intention to stop using a chunk of memory that was allocated to it…

…but carries on using it anyway, thus potentially trampling on data that other parts of the program are now relying on.

In the best case, a use-after-free bug typically leads to corrupted data or to a program crash, either of which can be considered a security problems in its own right.

In the worst case, a use-after-free leads to remote code execution, where the data that’s trampled on is wilfully modified by the attackers to trick the program into running untrusted code from outside.

Go to the About Firefox dialog to check your current version.

If you are out of date then Firefox will offer to fetch the update and then present a [Restart Firefox] button; click the button, or exit and restart the browser, to deploy the update.

The version numbers you want are: Firefox 97.0.2 or greater (if you are using the regular release), or Firefox 91.6.1 ESR or greater (if you are using the extended support release), or Firefox 97.3.0 for Android.

(Firefox 98.0 and Firefox 91.7 ESR are officially expected on 2022-03-08, just three days after this emergency fix.)

If you’re on Android, check for updates via the Play Store.

If you’re a Linux user where Firefox is managed by your distro, check your distro creator.

Note that if you are not yet on the latest major version (97.0 for regular Firefox, or 91.6 for the Extended Support Release), you may need to complete the update in multiple stages, so be sure to re-visit the About Firefox dialog after each update has been installed, to make sure you have finished all needed update-and-restart cycles.

Original author: Paul Ducklin

Why the World Needs a Global Collective Cyber Defe...
After a Busy December, Attacks on Log4j Vulnerabil...

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 02 October 2022

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://hexafusion.com/

Customer Login

News & Updates

Hexafusion is proud to announce the launch of our new website at www.hexafusion.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Hexafusion can do for your business.

Hexafusion
250 - 997 Seymour Street
Vancouver, British Columbia V6B 3M1