IMPORTANT. Update Firefox on Windows NOW

The machines we love to hate

Moderator: Wiz Feinberg

Post Reply
User avatar
b0b
Posts: 29108
Joined: 4 Aug 1998 11:00 pm
Location: Cloverdale, CA, USA
Contact:

IMPORTANT. Update Firefox on Windows NOW

Post by b0b »

Emergency announcement. Windows Firefox users should switch to a different browser right away.

For details, read
www.wordfence.com/blog/2016/11/emergenc ... 0-day-wild

UPDATE
Wordfence wrote:Update at 2:32pm PST / 5:32pm EST: Firefox released a fix for this a few minutes ago. Update to Firefox 50.0.2 now to patch this vulnerability. Tor have also released a fix with version 6.0.7 of their browser.There is also a Thunderbird fix out, version 45.5.1.
Last edited by b0b on 30 Nov 2016 4:54 pm, edited 2 times in total.
-𝕓𝕆𝕓- (admin) - Robert P. Lee - Recordings - Breathe - D6th - Video
User avatar
Jon Light
Posts: 13745
Joined: 4 Aug 1998 11:00 pm
Location: Saugerties, NY
Contact:

Post by Jon Light »

Ok. That was startling. Done (switched to Chrome.)
Been on FF for around 6 hours today including an update this morning. Wonder how to tell if I've been bugged.
User avatar
Wiz Feinberg
Posts: 6091
Joined: 8 Jan 1999 1:01 am
Location: Mid-Michigan, USA
Contact:

Post by Wiz Feinberg »

This 0-day is targeting a specialized version of Firefox, known as the Tor Browser. It is redirecting Tor users to a now offline server in France. This is a JavaScript exploit, which is fairly common in the cybercrime underworld. Firefox users who have the NoScript Add-on enabled will not be impacted, whether on the Dark Web (Tor) or the Bright Web.

As is typical, Mozilla will release a patch to everybody after analyzing the exploit code. Tor Browser will probably get a fix first.

Tor Onion websites are fraught with danger anyway.
Last edited by Wiz Feinberg on 30 Nov 2016 9:48 am, edited 1 time in total.
"Wiz" Feinberg, Moderator SGF Computers Forum
Security Consultant
Twitter: @Wizcrafts
Main web pages: Wiztunes Steel Guitar website | Wiz's Security Blog | My Webmaster Services | Wiz's Security Blog
User avatar
Wiz Feinberg
Posts: 6091
Joined: 8 Jan 1999 1:01 am
Location: Mid-Michigan, USA
Contact:

Post by Wiz Feinberg »

Jon Light wrote:Ok. That was startling. Done (switched to Chrome.)
Been on FF for around 6 hours today including an update this morning. Wonder how to tell if I've been bugged.
Did you visit any Onion websites on Tor? Are you using the Firefox Tor browser?
"Wiz" Feinberg, Moderator SGF Computers Forum
Security Consultant
Twitter: @Wizcrafts
Main web pages: Wiztunes Steel Guitar website | Wiz's Security Blog | My Webmaster Services | Wiz's Security Blog
User avatar
Jon Light
Posts: 13745
Joined: 4 Aug 1998 11:00 pm
Location: Saugerties, NY
Contact:

Post by Jon Light »

Nope and nope.
User avatar
Mike DiAlesandro
Posts: 1503
Joined: 8 May 2010 7:36 am
Location: Kent, Ohio
Contact:

Post by Mike DiAlesandro »

Ok
Last edited by Mike DiAlesandro on 30 Nov 2016 3:09 pm, edited 1 time in total.
User avatar
Randy Schneider
Posts: 226
Joined: 30 Apr 2016 9:52 pm
Location: SW New Mexico, USA

Post by Randy Schneider »

Firefox for Windows update (50.0.2) is now available. If you don't want to wait for it to be pushed to you, in FF go to 'help / about' and the new version will be downloaded.
User avatar
Wiz Feinberg
Posts: 6091
Joined: 8 Jan 1999 1:01 am
Location: Mid-Michigan, USA
Contact:

Post by Wiz Feinberg »

Happy about the update, but this zero-day was specifically written to expose the location of users of the Dark Web (Tor). There was no malicious code involved, just IP leakage. See this Malwarebytes article for more details.
"Wiz" Feinberg, Moderator SGF Computers Forum
Security Consultant
Twitter: @Wizcrafts
Main web pages: Wiztunes Steel Guitar website | Wiz's Security Blog | My Webmaster Services | Wiz's Security Blog
User avatar
Randy Schneider
Posts: 226
Joined: 30 Apr 2016 9:52 pm
Location: SW New Mexico, USA

Post by Randy Schneider »

Yes, this particular exploitation of the hole in FF was used for that purpose. The bigger concern was that once the vulnerability had been made public, other malicious payloads could/would take advantage of the now-known problem in Firefox and be delivered for purposes other than the Tor exposure. That is why FF needed to patch it so quickly.
User avatar
b0b
Posts: 29108
Joined: 4 Aug 1998 11:00 pm
Location: Cloverdale, CA, USA
Contact:

Post by b0b »

Update from Wordfence:
Update at 2:32pm PST / 5:32pm EST: Firefox released a fix for this a few minutes ago. Update to Firefox 50.0.2 now to patch this vulnerability. Tor have also released a fix with version 6.0.7 of their browser.There is also a Thunderbird fix out, version 45.5.1.
-𝕓𝕆𝕓- (admin) - Robert P. Lee - Recordings - Breathe - D6th - Video
User avatar
Randy Schneider
Posts: 226
Joined: 30 Apr 2016 9:52 pm
Location: SW New Mexico, USA

Post by Randy Schneider »

And thanks for letting us know about the problem this morning b0b. I hadn't heard about it before your post.
Ray Minich
Posts: 6429
Joined: 22 Jul 2003 12:01 am
Location: Bradford, Pa. Frozen Tundra

Post by Ray Minich »

Thanks b0b for the update info.

Didn't see anything on reddit or digg about this today so I really appreciate the guidance.

Thanks again.

PS: I wonder how many others start their forum browsing in "Steel Players"?
Lawyers are done: Emmons SD-10, 3 Dekleys including a D10, NV400, and lots of effects units to cover my clams...
User avatar
Earnest Bovine
Posts: 8318
Joined: 4 Aug 1998 11:00 pm
Location: Los Angeles CA USA

Post by Earnest Bovine »

The updates for Firefox (50.0.2)and Tor (6.0.7) have been available since yesterday afternoon Nov 30.
Post Reply