Security:ThePluginProblem

From MozillaWiki
Revision as of 22:24, 7 August 2009 by ChrisHofmann (talk | contribs)
Jump to navigation Jump to search

Overview

Plugin-risks.png

Over the last many years the Mozilla Project has worked hard at trying to find and fix security bugs in the Mozilla code before attackers have been able to develop exploits. The Security Bug Bounty Program ( http://www.mozilla.org/security/bug-bounty.html ) , Frequent Security Updates we do for Firefox users ( http://www.mozilla.org/security/announce/ ) , and the aggressive updating of Firefox Users have been the cornerstones of this effort.

Currently it appears the greatest security risk to Firefox users is via exploitation of plugins the user has installed. A number of studies have documented this

  • They are increasing a highly leveraged cross platform vector for attackers
    • http://www.techzoom.net/publications/insecurity-iceberg/index.en
    • (or 45.2%) Internet users at risk worldwide due to not running the latest most secure browser version. -- But Firefox actually leads the way with agressive updating of its users, while still providing choice and user control over the updates.
    • Meanwhile, hidden below the surface, the iceberg extends further encompassing users that rely on outdated vulnerable browser plug-ins. Due to an inability to passively enumerate the versions of any plug-ins hosts have installed.

critical version update for those soon. http://blogs.zdnet.com/security/?p=3229

A specific example

see bug 506419 and https://bugzilla.mozilla.org/show_bug.cgi?id=391433#c83

They show Firefox users under attack from a zero day for Adobe Flash and Reader.

The common response to bugs like these is that "it's not our problem." That is true to some extent, but here are some concrete things we could do.

While we are waiting from a patch from adobe

  • find new rogue .dll's in our crash reporting data and raise visibility to anti-virus companies.

What to do?

  1. grass roots campaign and PR to get users' plugins upgraded - up your plugin
  1. pressure plugin vendors to upgrade users faster

Help reduce bandwidth costs for plugin vendors to do more agressive updating of their users, or help to host the updates.

  1. active plugin blocking for old versions?

this strategy hasn't worked so far and many users seem to be resistant. see long discussion in : https://bugzilla.mozilla.org/show_bug.cgi?id=430826 starting around comment 72 - https://bugzilla.mozilla.org/show_bug.cgi?id=430826#c72

  1. fix our plugin migration code for a better upgrade experience - fx 3.1?
  2. study user experience problems and improve pop-up blocking again
  3. gather data from sumo and other sources to watch trends
  4. develop a community of malware investigators to understand more about what is happening and figure out solutions
  5. figure out how to help users that get into trouble


Work to help users understand plugins that are out of date, and accelerate udpates.

https://bugzilla.mozilla.org/showdependencytree.cgi?id=465898&hide_resolved=1