Closed Bug 290505 Opened 20 years ago Closed 20 years ago

Firefox does not seem able to show Motif files (.mta)

Categories

(Core Graveyard :: Plug-ins, defect)

defect
Not set
major

Tracking

(Not tracked)

VERIFIED INVALID

People

(Reporter: pconnolly, Unassigned)

References

()

Details

User-Agent:       Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Build Identifier: 

Motif is a form of Flash files that Double Click uses to serve rich media. The 
motif ads use a .mta extension, and are basically the same as an .swf with 
some addition ad tracking features. 

It doesn't appear that users can see motif files in Firefox, this is a serious 
problem for advertisers that are trying to serve those ads to an audience that 
is likely to download and use firefox.

Macromedia and Double Click have worked together to create this new user 
friendly file fomat, which seems to be working across other browsers (netscape 
and IE). Either company would have additional information on how to integrate 
it into a browser platform.

Reproducible: Always

Steps to Reproduce:
1.Go to any site with an .mta file running on it
2.
3.

Actual Results:  
On the specific URL mentioned, an alternate .gif is shown in place of the .mta 
file. The .mta/.swf file can be seen on the same page using a different 
browser (IE). The specific ad is a job listing ad about 1/2 way down the page.

Expected Results:  
Shows .gif Dice.com ad, instead it should show the .mta/.swf ad.
Why was this bug marked security-confidential?
Assignee: bugs → nobody
Component: File Handling → Plug-ins
Product: Firefox → Core
QA Contact: aebrahim-bmo → plugins
Version: unspecified → Trunk
Good question. 

Pat: could you please post a comment explaining what in your report is an issue
affecting the security of Firefox users? Alternatively, if you just checked the
checkbox mistakenly, that's fine - we'll make the bug public.

Gerv
Pat emailed me privately, saying:

"The security checkbox was inadvertent. Making the bug query public is fine."

Making the bug public.

Gerv
Group: security
Severity: blocker → major
Reporter:
Please add a miminized testcase (the doubleclick source is full of JS).
Um, this is at most an evangelism bug.

http://ad.doubleclick.net/adj/N1841.Windows_It_pro/B1518597.11;sz=336x280;ord=%n?

function _generateFixedFlashCode(variableName)
does: if(globalTemplate.isInternetExplorer() && (globalTemplate.isWindows() ...

So rather than  getting flash, we get the gif.  And that is done on purpoe by
doubleclick, ergo not a bug.
invalid per comment 5.
Status: UNCONFIRMED → RESOLVED
Closed: 20 years ago
Resolution: --- → INVALID
Status: RESOLVED → VERIFIED
Product: Core → Core Graveyard
You need to log in before you can comment on or make changes to this bug.