Zero-day flaw found in Firefox 3.5

The critical vulnerability in the two-week-old version of the browser opens users up to drive-by attacks, Mozilla has warned
Written by Tom Espiner, Contributor

There is a critical JavaScript vulnerability in the Firefox 3.5 web browser, Mozilla has warned.

The zero-day flaw lies in Firefox 3.5's Just-in-time (JIT) JavaScript compiler. Proof-of-concept code to exploit the vulnerability has been posted online by a security research group, Mozilla said in a post on its security blog on Wednesday. Security company Secunia rated the vulnerability as 'highly critical' on Wednesday.

The hole could allow a hacker to launch a 'drive-by' attack, according to Mozilla. That means an attacker may be able to execute malicious code on a target machine, if the victim visits a website containing an exploit.

No patch is currently available, but Mozilla developers are working on a fix. A workaround suggested in the blog post is to disable the Firefox 3.5 JIT compiler. However, Mozilla warned this would result in decreased JavaScript performance in Firefox.

The JIT compiler is part of TraceMonkey, which was added to Firefox for its 3.5 update released at the end of June. TraceMonkey is meant to optimise the browser, which is faster than previous iterations of Firefox, according to Mozilla.

On Wednesday, the US Computer Emergency Response Team said users and administrators should completely disable JavaScript functionality in Firefox 3.5.

The Sans Institute also said people could disable JavaScript, and suggested using NoScript, an open-source Firefox plug-in that only allows script to be executed by trusted websites.

Editorial standards