Firefox and Tor release critical 0-day patch originating in FBI code

The security world woke up Tuesday, November 29 to alarming reports of a 0-day vulnerability affecting Firefox and the anonymous browser Tor. The news first broke when an anonymous admin of the getting access to VirtualAlloc in kernel32.dll." In plain English, when a Windows machine used Firefox or Tor with Javascript enabled, the 0-day exploit allowed malicious code to be run at any time due to a memory corruption vulnerability.

As the news began to spread about this dangerous exploit, security researchers began to notice similarities in the code to another exploit that the FBI utilized. One such security professional gave his analysis via Tweets, which are screen capped below:

The 2013 FBI code was able to decrypt user identities who visited child porn sites via Tor. It would then transmit non-proxy IP addresses, MAC addresses, and other data to a main server in an attempt to apprehend the criminals. While there has been no confirmation as to whether or not the FBI is involved in this new 0-day, it would not surprise me if that was the case. It is not uncommon knowledge that the authorities use cyber solutions that not only help catch dangerous people, but also open up normal citizens to dangerous hacks (see: the iPhone San Bernardino incident). Even if the FBI is not involved in this new exploit; its code was still used to create a dangerous and potentially catastrophic cyber incident.

I say "potentially" because, thanks to the due diligence of researchers and coders, patches have been released by both Firefox and Tor. As Tor pointed out in their patch notes, the security flaw has been utilized already by some malicious hackers, but the damage was not as great as it could have been.

This incident teaches us is that when it comes to cyber crime and cyber security, a set of standards must be adhered to. There are rules of engagement in war, and now that the FBI is playing with fire via exploits, there needs to be an updated rules of engagement in fighting the cyber war. Security experts want criminals brought to justice, but we also don't want the rights of regular citizens compromised in the process.

Photo credit: wordfence, @TheWack0lian, Cliff

Derek Kortepeter

Derek Kortepeter is a graduate of UCLA and tech journalist that is committed to creating an informed society with regards to Information Security. Kortepeter specializes in areas such as penetration testing, cryptography, cyber warfare, and governmental InfoSec policy.

Published by
Derek Kortepeter

Recent Posts

User-friendly web design tools for a user-friendly website

If you want your business to succeed these days, you need a user-friendly website. Put these tools in your toolbox…

9 hours ago

New kids vs. old reliable: Can chat apps replace email?

Do businesses rely too heavily on email for communication? Yes! Is the answer to replace email with chat apps? No!…

14 hours ago

PowerShell function to standardize message box script outputs

If you got your start with Visual Basic, you remember msgbox. This PowerShell function will bring back memories and help…

17 hours ago

Microsoft Ignite 2019: Top announcements and product unveilings

Microsoft Ignite 2019 included a slew of updates on products and services. Among the announcements was Azure Arc, which may…

1 day ago

Who says configuration management can’t be fun?

Managing change in an enterprise isn’t easy and it’s usually no fun. Here’s a book on configuration management that will…

2 days ago

Choosing the right communication tools for your business

Choosing communication tools is like choosing a first progamming language. While you want easy, you also want cross-platform, security, and…

2 days ago