{"id":14073,"date":"2004-07-09T11:16:00","date_gmt":"2004-07-09T11:16:00","guid":{"rendered":"http:\/\/www.driko.org\/blog\/2004\/07\/09\/security-fix-for-mozilla-products\/"},"modified":"2004-07-09T11:16:00","modified_gmt":"2004-07-09T11:16:00","slug":"security-fix-for-mozilla-products","status":"publish","type":"post","link":"https:\/\/www.driko.org\/blog\/2004\/07\/09\/security-fix-for-mozilla-products\/","title":{"rendered":"Security Fix For Mozilla Products"},"content":{"rendered":"<p><a href=\"http:\/\/www.mozilla.org\/security\/shell.html\" target=\"_blank\"><img decoding=\"async\" align=\"right\" alt=\"Mozilla\" border=\"0\" src=\"http:\/\/www.driko.org\/blogicons\/mozilla.gif\" \/><\/a><a href=\"http:\/\/slashdot.org\/article.pl?sid=04\/07\/08\/2159244&amp;mode=thread&amp;tid=126&amp;tid=128&amp;tid=154&amp;tid=172&amp;tid=95\" target=\"_blank\"><i>Slashdot<\/i><\/a> and <a href=\"http:\/\/software.newsforge.com\/article.pl?sid=04\/07\/08\/2327246&amp;mode=nested&amp;tid=78&amp;tid=82\" target=\"_blank\"><i>NewsForge<\/i><\/a> report on a security vulnerability that affects Firefox, Thunderbird, and Mozilla running under Windows.  <a href=\"http:\/\/www.mozilla.org\/security\/shell.html\" target=\"_blank\">This link<\/a> explains the vulnerability and contains instructions on installing the <a href=\"http:\/\/ftp.mozilla.org\/pub\/mozilla.org\/mozilla\/releases\/mozilla1.7.1\/shellblock.xpi\" target=\"_blank\">patch<\/a> (an extension that disables the <i>shell:<\/i> external protocol handler) or downloading a new release (unnecessary unless you still haven&rsquo;t upgraded to Firefox 0.9.x, Thunderbird 0.7.x, or Mozilla 1.7.x).<\/p>\n<p>I know that <a href=\"http:\/\/www.driko.org\/2004\/07\/ditch-microoft-internet-explorer.html\" target=\"_blank\">I just railed against Micro$oft for security issues with Internet Explorer<\/a> (IE), but there is a difference here.  Mozilla offered a patch the same day as the disclosure of the security flaw, and new releases were available less than a day after that.  In contrast, as <i>NewsForge<\/i> points out, the recent patch for the serious IE flaw took over a week to be released, and it was still not properly fixed upon its release.  Additionally, this vulnerability is actually a flaw in Windows itself: &ldquo;Windows XP Service Pack 1 was supposed to have closed this hole, but apparently it is still functioning and leaving Windows systems open to remote attack.&rdquo;<\/p>\n<p>I was a little dismayed to see this news at first, but the <a href=\"http:\/\/www.sacarny.com\/blog\/index.php?p=104\" target=\"_blank\">speed and efficiency with which this issue was resolved<\/a> bolsters my confidence in the open-source development model that Mozilla products follow.  It also makes me feel that much uneasier about Micro$oft products&hellip;<br \/>\n<\/p>\n<div class=\"byline\">via <a href=\"http:\/\/www.mozillazine.org\/\" target=\"_blank\">MozillaZine<\/a><\/div>\n<div class=\"blogger-post-footer\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"https:\/\/blogger.googleusercontent.com\/tracker\/3501955-108937297674275352?l=www.driko.org%2Findex_blogger.html\" alt=\"\" \/><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Slashdot and NewsForge report on a security vulnerability that affects Firefox, Thunderbird, and Mozilla running under Windows. This link explains the vulnerability and contains instructions on installing the patch (an extension that disables the shell: external protocol handler) or downloading a new release (unnecessary unless you still haven&rsquo;t upgraded to Firefox 0.9.x, Thunderbird 0.7.x, or &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.driko.org\/blog\/2004\/07\/09\/security-fix-for-mozilla-products\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Security Fix For Mozilla Products&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[118],"class_list":["post-14073","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-imported"],"_links":{"self":[{"href":"https:\/\/www.driko.org\/blog\/wp-json\/wp\/v2\/posts\/14073","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.driko.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.driko.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.driko.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.driko.org\/blog\/wp-json\/wp\/v2\/comments?post=14073"}],"version-history":[{"count":0,"href":"https:\/\/www.driko.org\/blog\/wp-json\/wp\/v2\/posts\/14073\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.driko.org\/blog\/wp-json\/wp\/v2\/media?parent=14073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.driko.org\/blog\/wp-json\/wp\/v2\/categories?post=14073"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.driko.org\/blog\/wp-json\/wp\/v2\/tags?post=14073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}