Closed Bug 265878 Opened 20 years ago Closed 20 years ago

update.mozilla.org may be exposed to DNS pollution

Categories

(Toolkit :: Add-ons Manager, defect)

x86
Windows XP
defect
Not set
critical

Tracking

()

RESOLVED WORKSFORME

People

(Reporter: noamtm, Assigned: bugs)

Details

(Whiteboard: [sg:nse])

User-Agent:       Mozilla/5.0 (Windows; U; Windows NT 5.1; rv:1.7.3) Gecko/20040913 Firefox/0.10.1
Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; rv:1.7.3) Gecko/20040913 Firefox/0.10.1

IANAH (H for hacker), but there seems to be an opportunity for hacking in the
extension mechanism: I can only install software from "allowed sites", but what
if some virus/malware has changes my HOSTS file, or someone else has polluted my
DNS? update.mozilla.org (or any other "allowed" site) can be referred to any
other ip address.
There are many possible solutions (I have a few ideas) - but please verify my
concerns before. I'm checking the "security" box in the hope to get quick
[in]validation quietly.

Reproducible: Always
Steps to Reproduce:
1.
2.
3.
Before anyone comments on it, I just what to say that the main problem with this
bug is that it gives, in a way, a false sense of security - something like: "I
only have trusted sites on my list, I am safe".
What's the concrete problem? update.mozilla.org is just a normal website (or
not?), with special privilege to *propose* installations. The user still gets
the scary confirmation dialog. The whitelist was just an additional layer of
protection.

The above is not true, if Firefox makes some other assumption in the code and
implicitly trusts update.mozilla.org. In that case, you would be right, but the
hole would be pretty obvious to anybody who knows the slightest bit about
security (so no need to hide the bug). But I hope that's not the case, because I
hope the Firefox guys know enough about security to not trust http.

If anybody knows for sure, either way, please say so.
Group: security
Whiteboard: [sg:nse]
This is a valid concern that we have already addressed: Access
update.mozilla.org (umo) through https and you can be sure you are talking to
the real deal.

Firefox bases its built-in update checks on information it gets from umo, but it
communicates over SSL, and if updates are available it sends you to the SSL
version of umo. Ditto if you open the extension dialog and click on the "Get
more extensions" link.

If you are surfing on your own and visit the unsecure version of umo then you
are running the same risks millions of people do getting software from
http://download.com.com. DNS spoofing is rare, but Firefox has done what it can
to avoid even that problem by using SSL.

[You can, in fact, install software from any site. Just as you can download an
executable and run it, you can download a .xpi from any site and drop it onto a
browser window to run it. Both actions incur exactly the same risks.]
Status: UNCONFIRMED → RESOLVED
Closed: 20 years ago
Resolution: --- → WORKSFORME
Product: Firefox → Toolkit
You need to log in before you can comment on or make changes to this bug.