Mozilla last week issued the first patch for Firefox 3.5, fixing a flaw that went public Monday. One noted contributor had called the flaw a "self-inflicted" vulnerability.
Exploit code for the vulnerability was posted to the milw0rm.com malware site Monday, four days after Mozilla developers had discovered the bug and began working on a fix.
Andreas Gal, a project scientist at the University of California, Irvine -- and a key contributor to the TraceMonkey engine that Mozilla added to Firefox with Version 3.5 -- said that it appeared the hacker had created the attack code after spotting discussions and test cases on Bugzilla, Mozilla's bug- and change-tracking database. "Looking at the exploit code and our test cases, I think this is self-inflicted and we should have hidden the bug earlier," said Gal in one of several comments appended to the vulnerability's Bugzilla entry].
Although Mozilla had originally slated Firefox 3.5.1 for release later in the month, developers accelerated the schedule to plug the hole.
Thursday's update also addressed several unspecified stability issues and fixed a long-loading problem for some Windows users, according to Firefox 3.5.1's release notes.
Firefox 3.5.1 can be downloaded in Windows, Mac and Linux editions from Mozilla's site; current users can update by choosing "Check for Updates" under the "Help" menu.
While Mozilla rushed out a fix, rival Microsoft has yet to patch a bug that was publicly disclosed the same day -- Monday, July 13 -- that the attack code exploiting Firefox 3.5 hit the Web.
Hackers have been using a vulnerability in an ActiveX control used to publish Excel spreadsheets online and to display those in Internet Explorer, Microsoft's browser.
Microsoft has provided a tool that users can download, install and run that disables the ActiveX control -- and has provided instructions and tools for enterprises to do the same on a massive scale -- but it did not deliver a patch for the underlying problem Tuesday, its regularly-scheduled monthly patch day.
"If you haven't set those kill bits yet, be sure that you do now because the number of sites exploiting this vulnerability will probably rise exponentially soon," said Bojan Zdrnja, an ISC analyst in a warning posted to the center's site. The "kill bits" reference is to the downloadable tool that Microsoft had created, which disables the ActiveX control by modifying the Windows registry.