Submitted via IRC for Bytram
Mozilla Firefox 67.0.3 Patches Actively Exploited Zero-Day
Mozilla released Firefox 67.0.3 and Firefox ESR 60.7.1 to patch an actively exploited and critical severity vulnerability which could allow attackers to remotely execute arbitrary code on machines running vulnerable Firefox versions.
As Mozilla's security advisory says, the Firefox developers are "aware of targeted attacks in the wild abusing this flaw" which could allow attackers who exploit this vulnerability to take control of affected systems.
The Firefox and Firefox ESR zero-day flaw fixed by Mozilla was reported by Google Project Zero's Samuel Groß and the Coinbase Security team.
The type confusion vulnerability tracked as CVE-2019-11707occurs "when manipulating JavaScript objects due to issues in Array.pop."
Attackers could potentially trigger the type confusion by deceiving users of unpatched Firefox versions into visiting a maliciously crafted web page and, subsequently, executing arbitrary code on their systems.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) also issued an alert advising users "to review the Mozilla Security Advisory for Firefox 67.0.3 and Firefox ESR 60.7.1 and apply the necessary updates."
(Score: 2, Informative) by Anonymous Coward on Friday June 21 2019, @05:16AM (5 children)
lol, except you're not: there a 67.0.4 now ... another critical security hole in javascript.
(Score: 1, Offtopic) by realDonaldTrump on Friday June 21 2019, @06:18AM (4 children)
This is a Cyber that's changing faster than our "wonderful" Soylent News Submitters & Editors -- and many of the Submitters, that actually get their Message through are Editors -- can keep up. They're changing it because of "security." While my military is working with 1970s Cyber. For ICBMs, for many things. You think ICBM, it's the ultimate in security, right? But, very old Cyber. Crazy!!!!
(Score: 1, Offtopic) by realDonaldTrump on Friday June 21 2019, @06:21AM (3 children)
(cont) By the way, the Link. foxnews.com/tech/americas-nuke-program-runs-on-floppy-disks [foxnews.com]
(Score: 2) by PiMuNu on Friday June 21 2019, @11:03AM (2 children)
I saw RoboCop, I mean that was just a city goverment and they had robots to do the policing. Now we find out that federal government's ICBMs can't even afford up-to-date computers. Crazy!
(Score: 2) by Freeman on Friday June 21 2019, @02:08PM (1 child)
Don't fix it, if it ain't broke. Sure, that saying can get you in trouble sometimes, but so many times it's too true. At this point, I'd be afraid someone would have the bright idea to put the ICBM control computer on the internet. IoTs are so secure!
Joshua 1:9 "Be strong and of a good courage; be not afraid, neither be thou dismayed: for the Lord thy God is with thee"
(Score: 0) by Anonymous Coward on Friday June 21 2019, @11:48PM
They already have these for the 26 pin floppy cable (the pin version of the 26 pin Shugart edge connector?)
How hard would it be to engineer one for these nuclear systems? If you can't use USB/SD or capacitive memory, like flash, there is still FRAM, available in 8 pin SPI packages. 512K chips in a custom module that plugs into a rad-hardened floppy emulator seems perfect.
And I am pretty sure the STM32 has a rad hardened variant now too, doesn't it?
This is like money sitting on the table for someone talented enough to build it.