Firefox Update Patches Exploited Vulnerability

Firefox Update Patches Exploited Vulnerability

Firefox Update Patches Exploited Vulnerability

Home » News » Firefox Update Patches Exploited Vulnerability
Table of Contents

Mozilla, the corporate in the back of the browser Firefox, issued a repair on Wednesday for a zero-day vulnerability they are saying has been exploited. NIST lists the vulnerability as CVE-2024-9680, and its standing as “awaiting analysis.” Firefox customers will have to replace to the newest model of the browser and of the prolonged reinforce releases to give protection to their methods from possible assaults.

Due to standard use of Firefox, this factor poses a vital chance, specifically for methods that haven’t been up to date. No explicit information about the attackers or exploitation strategies were launched, however imaginable assault vectors come with drive-by downloads or malicious web pages.

Use-after-free flaw highlights cracks in memory-unsafe programming languages

The attacker discovered the use-after-free flaw in Animation timelines, a part of an API that shows animations on internet pages. A use-after-free trojan horse happens when a connection in dynamic reminiscence is left open after already getting used. It can stem from code written in a programming language that doesn’t use computerized reminiscence control, similar to C or C++. The U.S. govt’s advice clear of memory-unsafe languages is an try to save you this sort of flaw.

SEE: Both Microsoft and Apple launched primary fixes in this month’s Patch Tuesday.

“We have had reports of this vulnerability being exploited in the wild,” Mozilla wrote.

“Within an hour of receiving the sample, we had convened a team of security, browser, compiler, and platform engineers to reverse engineer the exploit, force it to trigger its payload, and understand how it worked,” wrote Tom Ritter, safety engineer at Mozilla, in a weblog publish on Oct. 11.

Mozilla deployed the repair in simply 25 hours, Ritter identified.

“Our team will continue to analyze the exploit to find additional hardening measures to make deploying exploits for Firefox harder and rarer,” he wrote.

This isn’t the primary time Mozilla has skilled a cyber incident. In 2015, a crucial flaw allowed attackers to bypass the browser’s same-origin coverage and get admission to native information. In 2019, the corporate patched a zero-day flaw that attackers have been actively exploiting to take over methods through tricking customers into visiting malicious websites, underscoring the significance of staying up to date with the newest browser variations.

However, Mozilla issued an advisory for only one different crucial vulnerability within the remaining yr, an out-of-bounds read-or-write vulnerability Trend Micro found out in March.

Other internet browsers were centered lately

Several different internet browsers were exploited through cyberattackers lately:

  • Google Chrome: Due to its standard use, Chrome has been a commonplace goal. For instance, in 2022, Google patched a significant zero-day vulnerability associated with a Type Confusion trojan horse within the V8 JavaScript engine, which allowed for arbitrary code execution.
  • Microsoft Edge: In 2021, a sequence of vulnerabilities allowed attackers to hold out far flung code execution, together with a topic discovered within the WebRTC element.
  • Apple Safari: Since 2021, Apple has patched a sequence of zero-day vulnerabilities, together with the ones used to focus on iPhone and Mac customers thru WebKit, the engine that runs Safari.

How to use the Mozilla patch

The following variations come with the patch:

  • Firefox 131.0.2.
  • Firefox ESR 115.16.1.
  • Firefox ESR 128.3.1.

To replace your browser, pass to Settings -> Help -> About Firefox. Re-open the browser after making use of the replace.

When reached for remark, Mozilla pointed us to their safety weblog.

author avatar
roosho Senior Engineer (Technical Services)
I am Rakib Raihan RooSho, Jack of all IT Trades. You got it right. Good for nothing. I try a lot of things and fail more than that. That's how I learn. Whenever I succeed, I note that in my cookbook. Eventually, that became my blog. 
share this article.

Enjoying my articles?

Sign up to get new content delivered straight to your inbox.

Please enable JavaScript in your browser to complete this form.
Name