Mozilla has downplayed a threat posed by the first vulnerability reported for Firefox 3.0, telling users that the risk is "minimal."
"There is no public exploit, the details are private, and so the risk to users is minimal," Window Snyder, Mozilla's chief security officer, said in an entry to a company blog.
According to the security company that reported the vulnerability to Mozilla, the bug is present in the Windows, Mac OS X and Linux versions of Firefox.
Snyder was responding to news that 3Com's TippingPoint, a security vendor that runs the Zero Day Initiative bug bounty program, had purchased a critical Firefox 3.0 vulnerability from an unnamed researcher and then forwarded information on the bug to Mozilla.
As per its policy, TippingPoint said it would not release details of the bug until Mozilla has crafted a patch. Wednesday, however, it did note that the vulnerability would let hackers execute remote code -- making the bug a critical flaw -- and that it would require some action by the potential victim, such as clicking on a link in an e-mail message or visiting a malicious or compromised site.
Thursday, Terri Forslof, TippingPoint's manager of security response, expanded somewhat on the vulnerability's range. "It's not operating system specific," she said. "It's browser specific, only on Firefox, but on Windows, Mac and Linux."
Snyder confirmed that Mozilla had received word from TippingPoint -- Forslof said she had e-mailed Snyder directly with a heads-up -- and that her team was looking into the problem. "To protect our users, the details of the issue will remain closed until a patch is made available," she said.
Wednesday, TippingPoint sounded confident that Mozilla would quickly fix the flaw. "Working with Mozilla on past security issues, we've found them to have a good track record and expect a reasonable turnaround on this issue as well," TippingPoint noted in a blog posting of its own.
Although Mozilla provided no additional information nor did it offer recommendations for users, TippingPoint's Forslof was willing to do so. "This is in the same line as lots of other browser vulnerabilities," she said, "so the advice is in the same line, too. Don't click on links in e-mail, make sure the operating system is up-to-date, and don't visit unsafe sites."
Forslof added that the researcher, who has chosen to remain anonymous, is someone TippingPoint has worked with before. "He's a regular contributor to our program," she said.
She wouldn't disclose more than that, but did say it wasn't unusual for researchers to suddenly reveal a vulnerability that they'd discovered some time before. "I can think of several examples," Forslof said. "It's highly likely that he [found the bug] in their last version [of Firefox], and was just waiting for them to release 3.0 to see if they'd fixed it there."
According to both TippingPoint and Mozilla, the vulnerability is in the older Firefox 2.0 series as well as the brand-new Firefox 3.0, which launched Tuesday (Read Firefox 3.0 review here).