We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
78,780 News Articles

Firefox and IE continue fight over zero-day flaws

'Internet Explorer is not to blame'

Internet Explorer and Mozilla Firefox executives are both adamant that the other's application is at fault for a recent speight of multiple Windows zero-day vulnerabilities.

This week a Microsoft Internet Explorer program manager and Mozilla's head of security added their voices to the browser blame game.

Writing on the IE blog, Internet Explorer program manager Markellos Diorinos said that the spate of protocol handler bugs involving the Microsoft browser are the fault of the other applications, not IE.

"The limitless variety of [third-party] applications and their unique capabilities make it very difficult to have any meaningful automated parameter validation by the hosting (caller) application," said Diorinos.

In the vulnerabilities disclosed so far that involve Mozilla's Firefox browser and Cerulean Studios' Trillian instant-messaging client, IE has been pegged as the application that calls on those program's unique protocols.

It is, in Diorinos' terminology, the "hosting" application.

"It is the responsibility of the receiving (called) application to make sure it can safely process the incoming parameters," Diorinos said.

Diorinos' comments came in response to the ongoing controversy about a flaw that involves both IE and Firefox.

Last week, Danish researcher Thor Larholm, among others, put the onus on IE, and said that while Firefox registers the "firefoxurl://" protocol used in his proof-of-concept exploits, Mozilla's browser is an innocent bystander. This week, other security researchers said a similar problem involved IE and the "aim" protocol used by Trillian, a multi-service instant messaging program, or for that matter, any AIM (America Online Instant Messenger) client.

Microsoft's stance has not changed since last week, when it first denied that IE was at fault. "Microsoft has thoroughly investigated the claim of a vulnerability in Internet Explorer and found that this is not a vulnerability in a Microsoft product," a spokesman said last week.

"URL protocol handlers are one of the ways we enable rich experiences in browsing, however, as with any other program that accepts untrusted data from the web, URL protocol handling applications must be carefully designed based on the threat environment," stressed Diorinos.

Mozilla, meanwhile, turned up the heat Tuesday when it updated Firefox to version 2.0.0.5 and patched the open-source browser so it would not accept out-of-bounds data from other applications, such as IE.

And like its browser rival, Mozilla said Microsoft should shape up.

"[This] does not fix the critical vulnerability in Internet Explorer," Windows Snyder, Mozilla's chief security executive, said Wednesday of the Firefox update. "Microsoft needs to patch Internet Explorer."

Firefox 2.0 review

Internet Explorer 7.0 review


IDG UK Sites

Top 5 Android tips and tricks for smartphones and tablets

IDG UK Sites

How to join Apple's OS X Beta Seed Program: Get OS X Yosemite on your Mac before public release

IDG UK Sites

Why the BBC iPlayer outage was caused by a DDoS attack: Topsy and Tim isn't *that* popular

IDG UK Sites

BBC using Glasgow 2014 Commonwealth Games to trial 4K/UHD, pan-around video, augmented video and...