Firefox and Tor release critical 0-day patch originating in FBI code

The security world woke up Tuesday, November 29 to alarming reports of a 0-day vulnerability affecting Firefox and the anonymous browser Tor. The news first broke when an anonymous admin of the getting access to VirtualAlloc in kernel32.dll." In plain English, when a Windows machine used Firefox or Tor with Javascript enabled, the 0-day exploit allowed malicious code to be run at any time due to a memory corruption vulnerability.

As the news began to spread about this dangerous exploit, security researchers began to notice similarities in the code to another exploit that the FBI utilized. One such security professional gave his analysis via Tweets, which are screen capped below:

The 2013 FBI code was able to decrypt user identities who visited child porn sites via Tor. It would then transmit non-proxy IP addresses, MAC addresses, and other data to a main server in an attempt to apprehend the criminals. While there has been no confirmation as to whether or not the FBI is involved in this new 0-day, it would not surprise me if that was the case. It is not uncommon knowledge that the authorities use cyber solutions that not only help catch dangerous people, but also open up normal citizens to dangerous hacks (see: the iPhone San Bernardino incident). Even if the FBI is not involved in this new exploit; its code was still used to create a dangerous and potentially catastrophic cyber incident.

I say "potentially" because, thanks to the due diligence of researchers and coders, patches have been released by both Firefox and Tor. As Tor pointed out in their patch notes, the security flaw has been utilized already by some malicious hackers, but the damage was not as great as it could have been.

This incident teaches us is that when it comes to cyber crime and cyber security, a set of standards must be adhered to. There are rules of engagement in war, and now that the FBI is playing with fire via exploits, there needs to be an updated rules of engagement in fighting the cyber war. Security experts want criminals brought to justice, but we also don't want the rights of regular citizens compromised in the process.

Photo credit: wordfence, @TheWack0lian, Cliff

Derek Kortepeter

Derek Kortepeter is a graduate of UCLA and tech journalist that is committed to creating an informed society with regards to Information Security. Kortepeter specializes in areas such as penetration testing, cryptography, cyber warfare, and governmental InfoSec policy.

Share
Published by
Derek Kortepeter

Recent Posts

Monitoring Azure Windows Virtual Desktop using PowerShell

Monitoring Azure Windows Virtual Desktop, especially keeping an eye on the health of session hosts…

11 hours ago

Moving your SQL database to Azure SQL: Using the import method

Migrating SQL data to Microsoft Azure takes planning because there are several ways to do…

14 hours ago

Gateways and routers: A head-to-head comparison

Gateways and routers perform different functions, so both are necessary for a network. Let’s look…

17 hours ago

The new brain drain: What if WFH tech employees don’t come back?

Offices are reopening, but after months of a work-from-home routine, many employees may not want…

1 day ago

Amazon Fraud Detector generally available

Online payment frauds are a threat to any company doing business on the Web. Amazon…

2 days ago

Identity and access management sector buzzes with new funding, partnerships, solutions

Because no organization wants to end up in the headlines for a data breach, there…

2 days ago