Mozilla fixes zero-day Firefox bug used to attack Tor users
The Tor browser is the most widely used privacy tool to browse the Internet anonymously. The Tor Project built the network partially on open source code similar to an old version of Firefox. Exploit a vulnerability in that Firefox version and you unmask the otherwise anonymous Tor users. That’s what happened with Mozilla’s popular browser this week, and the organization was quick to roll out an update that fixes the zero-day vulnerability.
A public Tor Project mailing list revealed the bug which prompted Mozilla to update Firefox to version 50.0.2. The Tor Project team also issued patches for the Tor browser that now bumps it up to version 6.0.7. While The Tor Project believes the vulnerability has affected only the Windows users, it is also possible that the bug has hit macOS and Linux users as well.
The zero-day vulnerability also affected Mozilla’s Thunderbird e-mail application and the Firefox Extended Support release version. Daniel Veditz, Mozilla’s security team lead, wrote in a blog post:
A serious threat
If an attacker can lure a user into visiting a malicious web content, it is possible to remotely execute arbitrary code on the system by taking advantage of the vulnerability.
Security experts believe the exploit is similar to a Firefox flaw the FBI used in 2003 to identify visitors to a child-abuse site. Veditz wrote that the threat now poses a serious threat to privacy if a government agency indeed built it.
This similarity has led to speculation that this exploit was created by FBI or another law enforcement agency.