Seika wrote:
> Since I'm not very familiar with architecure of Firefox I just ask my
> question and hope someone is nice enough to answer it. :-)
> 
> So now my question, is it possible to develop an exploit which runs
> inside the browser and uses the browser itself to offer a hacker
> remote access to my PC?
> 
> The reason why I'm asking, I'm currently working on a security concept
> for a workinggroup. The concept includes a proxy where each http
> traffic is directed to. Each browser must authenticate to the proxy.
> In my concept the proxy is the only way to get into the internet. A
> trojan horse which is running from a PC can't connect to the internet
> because it doesn't know how and even if it would know how it it
> doesn't know how to authenticate to the proxy. But if browse with my
> Firefox to a website which got hacked and is used to distribute an
> exploit which runs out of my browser and with the cooperation of the
> browser, it is very simple for the exploit to get contact to the
> internet because Firefox knows why.
> 
> Is it possible?
> 
> Thanks for hints.
> 


Of course its possible, Theres numerous documented vulnerabilities, and 
possibly, albeit unknown to the greater infosec mass, undisclosed 
Firefox vulnerabilites. Although these vulnerabilities are few in 
number, {Especially when compared to Internet Explorer}.

I should also point out, I've never seen any such automated compromise 
of Firefox browsers, I'm aware of it's existence, but it isn't that 
common in the wild, imaginably even in post-0day exploit release. The 
point is, Your methodology is going to disable the most basic trojans, 
however for hackers {A person with shell access}, circumventing this 
will be trivial, and advanced trojans may dump proxy authentication 
information from Firefox/IE anyway.
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to