Thanks for the replies. I've seen some comments just rely on the fact that bugs are fixed much earlier/ Open source... doesn't add to the software security per se. I am more inclined on security mechanisms provided within the browser. Such as input sanitization etc.
Also I would like to draw the following fact
I have to say that sometimes the internet comunity's behavior varies depending to which company caused the Vulnerability.
In many articles people point fingers at micro$oft for installing the extension/plug-in and it was vulnerable and the fuss about it was made was incredible.
http://threatpost.com/en_us/blogs/microsoft-net-plug-exposes-firefox-users-malware-attacks-101609
But lets face it all other distributors that have a plug-in sneaked the installation in the plug-in folder. Eg: Adobe Reader, Realtime, Quicktime, Java, Flash
Adobe and Quicktime had their fair share of exposing the user to vulnerabilities from these addons why was Micro$oft flamed that much ? Isn't it the same thing ? (I am by no means siding anyone I just want to know what the community thinks)
I know some of you may say "but we all know that Adobe installs the plugin" yes we do but... was this always the case ? or we learned that through experience ? "Cool now PDF opens in the browser" time passed by and it became like an obvious part of Adobe product (replace adobe with any other software that does this)
Speaking of Plug-ins
ActiveX is a major threat we all know it that can expose user to various vulnerabilities. In my opinion NPAPI isn't more secure than ActiveX, actually quite of the same level of problems. An unchecked buffer in ActiveX is as much as exploitable an unchecked buffer in NPAPI Plug-ins. If anyone has evidence to disprove my statement, I encourage you to do so because I am interested in learning.
Comments
to: moorecm:
will your competitor say nice things about you?
to: imi: yes I like your reasoning, this is what I am talking about. Just because the browser has a high ammount of successful attacks does not make it less secure. Might be the case that its more used at large. might be its the target of the moment from attackers.
to: darkestfright
vulnerabilities that could arise the chance that a System Killing hack slips in through a plugin is lower. Mozilla also has robust digital signing for plugins |
how is it so ? when you can sneak a plugin by just any installation in the plug-in folder and is readily available with next Firefox reload ?
Firefox (and Google Chrome too) on the other hand, is Open Source so the chance that any kind of malicious code in the browser itself is practially nil |
I have my doubts, I asked about the plug-in sample sourcecode they provide that doesnt compile in irc Mozilla server their reply leaved me shocked "the person who wrote the mechanism is not with us anymore and really few know what is really going on in there" ( and that was enough for me to know why there are several unanswered questions about Firefox plug-in development ) Samples in mozilla trunk date back to 2003-2007
http://mxr.mozilla.org/seamonkey/source/modules/plugin/tools/sdk/samples/
http://mxr.mozilla.org/seamonkey/source/modules/plugin/samples/
Refs
http://groups.google.com/group/mozilla.dev.tech.plugins/browse_thread/thread/b9e2fbd7eabd6413/6e7d6b7a84d58174
http://osdir.com/ml/mozilla.devel.plugins/2008-05/msg00006.html
I'm still open for more :D