|
马上注册,结交更多好友,享用更多功能,让你轻松玩转社区
您需要 登录 才可以下载或查看,没有账号?立即注册
×
from:https://www.bloomberg.com/news/a ... probably-filmed-you
Tor Browser Issues Update for Critical System Takeover Flaw
The update patches critical flaw (CVE-2019-11707), a type confusion vulnerability in the Mozilla Firefox code that Tor uses.
Tor Browser has updated to version 8.5.2, to address a critical security flaw in Mozilla’s Firefox browser that is under active exploit in the wild.
The critical flaw (CVE-2019-11707) is a type confusion vulnerability in the Array.pop, which is an array method that is used in JavaScript objects in Firefox. The vulnerability, which was disclosed and patched earlier this week, enables cybercriminals to take full control of systems running the vulnerable Firefox versions.
The issue affects Tor, since, as its founders said back in 2016, Firefox is at the heart of the privacy-focused onion browser.
[img]https://media.threatpost.com/wp-content/uploads/sites/103/2019/02/19
“If you’ve used Tor, you’ve probably used Tor Browser, and if you’ve used Tor Browser you’ve used Firefox,” they said [url=https://blog.torproject.org/tor-heart-firefox]in a posting. “By lines of code, Tor Browser is mostly Firefox — there are some modifications and some additions, but around 95 percent of the code in Tor Browser comes from Firefox.”
The Android release for Tor won’t be available until this weekend, the project said, because of team travel.
“In the meantime, Android users should use the safer or safest security levels,” Tor said in an update on Thursday. “The security level on Android can be changed by going in the menu on the right of the URL bar and selecting Security Settings.”
Speedy updates are recommended given that the Firefox bug is being actively exploited in targeted attacks against Coinbase employees – and potentially other cryptocurrency organizations.
“On Monday, June 17, 2019, Coinbase reported a vulnerability used as part of targeted attacks for a spear phishing campaign,” Selena Deckelmann, senior director of Firefox Browser Engineering, told Threatpost. “In less than 24 hours, we released a fix for the exploit.”
Meanwhile, Tor also updated NoScript to 10.6.3, “fixing a few issues” – the update means that it no longer blocks MP4 on higher security levels, and it prevents cross-site scripting (XSS) protection from freezing the browser.
|
|