not too long released, newest Firefox of version 3.5, has faced new problem. US-CERT ( Computer Emergency Response Team) merilis commemoration, Tuesday ( 14/7) this, that browser Firefox 35 having susceptible defence system is attacked [by] long distance attacker ( remote attacker) by threading dangerous codes.
More clear, susceptance owned by Firefox 35 relating to Firefox how to process JavaScript code. Example of from dangerous code of itself have been showed Monday then ( 13/7) in site Milw0rm,com, a site about exploitation of dangerous codes. The thing peeps out possibility that susceptible of Firefox 35 has started powered. The Side Of Mozilla x'self has known this susceptance problem to and starts does repair testing. But, till now unfinished is developed patch its(the penambal. Therefore, Mozilla release advice to minimize attack risk. " Susceptance can be exploited attacker if s(he successfully trap computer consumer to see site having the dangerous codes," says the side of Mozilla in their Security Blog. Still, susceptance from Firefox can help by the way of kills JIT in Javascript Engine Untuk to kill Javascript engine can be done with three steps. Firstly, types about:config in column search your Firefox browser. Second, types jit in filter column located in to config editor. Third, click twice line javascriptoptions.
jitcontent to change its(the value becomes false.
As mode alternative, plug-in NoScript also able to be applied to kill all JavaScript of the browser. This susceptance problem also has got many commentses from some computer companies in world. Secunia, a company which active in computer security and bases on in Denmark for example assessing level of susceptance from Firefox 35 very critical and even can influence Firefox stripper version. F-Secure, company of Finlandia which active in the same with Secunia also adds that software Exploit Shield can hinder exploiting of dangerous codes to groan Firefox 3.5.
0 comments:
Post a Comment