Download this now: Numerous Firefox vulnerabilities fixed in update

Recently, Mozilla released Firefox version 54. According to the security advisory released by the company, a large number of critical and high-risk vulnerabilities were patched in this most recent update. For those who have not downloaded the most recent version, let this post be used as a push to get you to install it as quickly as possible.

One critical vulnerability that received patching was a vulnerability catalogued as CVE-2017-5472, which allowed for "use-after-free using destroyed node when regenerating trees." The issue here is that a hacker could exploit the reallocated freed memory to start a buffer overflow attack, although OWASP states "we are unaware of any exploits based on this type of attack." The possibility for such an attack, however, is enough to consider the vulnerability critical as hackers can execute their own code and steal sensitive data.

Two other critical vulnerabilities that were patched in this update had similar issues. CVE-2017-5470 and CVE-2017-5471 both, according to the security report, "showed evidence of memory corruption," and researchers surmised that "with enough effort that some of these could be exploited to run arbitrary code." The likely result, if you are dealing with a true professional black hat, is that arbitrary code could allow for anything under the sun to be executed on your machine.

Other patched vulnerabilities of interest in Firefox 54 include CVE-2017-7755. This is particularly notable as it only affects Windows users, who make up a large sum of the population that use computers. The vulnerability allows privilege escalation via an exploit in the Firefox installer by utilizing "malicious DLL files stored in the same directory as the installer when it is run."

As stated at the beginning of this article, if you are a Firefox user who hasn't downloaded the most recent version, you are playing a foolish game. I realize it is tedious to update your browser, but the relatively short time it takes to update may save you a whole lot of headaches later.

Photo credit: Mozilla Foundation

Derek Kortepeter

Derek Kortepeter is a graduate of UCLA and tech journalist that is committed to creating an informed society with regards to Information Security. Kortepeter specializes in areas such as penetration testing, cryptography, cyber warfare, and governmental InfoSec policy.

Published by
Derek Kortepeter

Recent Posts

IFA 2019: All the top smartphone announcements and unveilings

IFA 2019, this year’s version of the annual consumer electronics trade show, did not disappoint. Is one of these smartphones…

35 mins ago

Outlook connectivity: Troubleshooting and solving common issues

IT professionals all dread getting this fevered message from employees and clients: “I’m having Outlook connectivity issues!” Here’s what you…

5 hours ago

Using tags with Azure runbook automation to control your costs

Here’s a script designed to start and stop virtual machines based on tags associated at the resource group level. It…

8 hours ago

Software-defined perimeter solutions: Why this is the future of security

Traditional VPNs are showing their age in the modern cloud-powered workplace. That’s why software-defined perimeter solutions are in your future.

3 days ago

Why you need to check your virtualization host’s NUMA configuration

Should you disallow NUMA spanning in your Hyper-V architecture? There are two sides to this story, and you’ll get both…

3 days ago

Getting started with Visual Studio Code and integrating with Azure DevOps

Coding may not be the No. 1 job duty for cloud admins, but it is often a part of the…

3 days ago