TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How to install silently malicious extensions for Firefox

18 pointsby felipebuenoover 12 years ago

4 comments

pandogover 12 years ago
This isn't a security issue in Firefox.<p>To pull this off you need write access to Firefox's SQLite database.<p>If you have write access to Firefox's SQLite database you've already 'won', the system is already yours. You can do a lot more damage to the system than whitelisting a Firefox extension.<p>Sure you could argue that this is another place for malware to hide - but I don't that this is really a security flaw in Firefox.
评论 #5067179 未加载
评论 #5066986 未加载
roger5over 12 years ago
Right. I can also write an app that reads the process memory of FF and steals your passwords.
pi18nover 12 years ago
This is one of the exact scenarios Apple is trying to prevent with Gatekeeper. Although I think Apple implemented it poorly and I strongly object to their code signing policies, I do hope more OS's include application-level permissions and methods for developers to sign their binaries as a standard thing.
martincedover 12 years ago
Plugins and automatic security updates (or any update for what it is worth) are two biggest security holes ever.<p>Which is why for anything really sensitive I'm booting from a live CD, giving me a system which is "read-only" and not "phoning home" to see if there are updates.<p>It's a pain. But less of a pain than getting root'ed / admin'ed.<p>Signed binaries ain't helping either: we've seen several seemingly "legit" software signed with compromised keys.<p>False sense of security.
评论 #5068241 未加载