[IS&T Security-FYI] Newsletter, March 28, 2008
Monique Yeaton
myeaton at MIT.EDU
Fri Mar 28 09:24:27 EDT 2008
In this issue:
1. Mozilla Security Updates
2. Security in Browser
----------------------------------
1. Mozilla Security Updates
----------------------------------
Products affected:
* Mozilla Firefox
* Mozilla Thunderbird
* Mozilla SeaMonkey
The Mozilla and the SeaMonkey projects have released Mozilla Firefox
2.0.0.13, Thunderbird 2.0.0.13, and SeaMonkey 1.1.9 this week to
address several vulnerabilities. An attacker could exploit these
vulnerabilities by convincing a user to view a specially crafted HTML
document, such as a web page or an HTML email message. The Firefox
update fixes six vulnerabilities, two of which were rated as critical
by Mozilla.
To download the latest Mozilla product, visit:
<http://www.mozilla.org/download.html>
-----------------------------
2. Security in Browsers
-----------------------------
Why is security in browsers so important? Because many attacks are
now designed to exploit the flaws in the browsers we use. Spoofing,
cross-site scripting, and malicious code installation are some of the
results of these exploits. So when a browser releases a new update,
it is always done to try to fix these kinds of holes where attacks
can be made.
The result of all these security features, however, is that although
users want web browsers that keep them safe on the Web from phishing,
malware, and web irritants such as popups, they'll stubbornly click
through warnings dialogs, ignore security indicators, and generally
behave in reckless ways in order to complete their tasks. Who could
blame them? Historically the techniques used in web browsers to
communicate to users about security has been a rogues' gallery for
the User Interface Hall of Shame. Security indicators are out of the
way and hard to interpret, terminology is relentlessly confusing, and
the responsibility for who decides what is safe and what isn't is
tossed into the user's lap like a hot potato.
In the recent release of Firefox 2.0.0.13 and last year's release of
IE7 users will notice the abundance of warning dialogs. Firefox
2.0.0.13 changed the default behavior of personal certificates to
prompt the user each time a web site requests a certificate. The old
behavior, of not prompting a user, made it easier for malicious web
site to track users' activities by requesting the client certificate,
even though they were from a different domain. To get past this
warning, you will need to select "OK" in response to this message
when visiting MIT pages that require a personal certificate.
Is this going to be tedious after a while? It may be. Those users who
have used Vista or IE7 will already be familiar with this type of
security behavior. It is important to stay aware of what you are
doing when on the Web. It's easy to be distracted and click "OK" even
when it might be better not to.
Tips on securing your web browser can be found on the US-CERT site here:
<http://www.us-cert.gov/reading_room/securing_browser/
browser_security.html#how_to_secure>
[portion of article source: Johnathan Nightingale, Mozilla Corporation]
=========================
Monique Yeaton
IT Security Awareness Consultant
MIT Information Services & Technology (IS&T)
(617) 253-2715
http://web.mit.edu/ist/security
More information about the ist-security-fyi
mailing list