There is a critical JavaScript vulnerability in the
Firefox 3.5 Web browser, Mozilla has warned.
The zero-day flaw lies in Firefox 3.5's Just-in-time (JIT)
JavaScript compiler. Proof-of-concept code to exploit the vulnerability
has been posted online by a security research group, Mozilla said in a post on its security blog on Wednesday. Security company Secunia rated the vulnerability as "highly critical" on Wednesday.
The hole could allow a hacker to launch a "drive-by" attack,
according to Mozilla. That means an attacker may be able to execute
malicious code on a target machine, if the victim visits a Web site
containing an exploit.
No patch is currently available, but Mozilla developers are
working on a fix. A workaround suggested in the blog post is to disable
the Firefox 3.5 JIT compiler. However, Mozilla warned this would result
in decreased JavaScript performance in Firefox.
The JIT compiler is part of TraceMonkey, which was added to Firefox for its 3.5 update released at the end of June. TraceMonkey is meant to optimise the browser, which is faster than previous iterations of Firefox, according to Mozilla.
On Wednesday, the United States Computer Emergency Response Team
said users and administrators should completely disable JavaScript
functionality in Firefox 3.5.
The Sans Institute also said people could disable JavaScript,
and suggested using NoScript, an open-source Firefox plug-in that only
allows script to be executed by trusted Web sites.