"Firefox OS anticipates your needs, adapts to every situation and instantly delivers the
information you want.
That includes popular, big name apps, but also local content that means the most to you and your life."
Is the quote on the Firefox OS page.
But it has recently been revealed that the operating system which seeks to compete against the Android and IOS market may be vulnerable to attack, the Firefox OS is built around HTML5, the latest version of the open
standard web programming language that is designed to be more
interactive and multimedia friendly.
Firefox OS borrows much from the Firefox mobile browser and Gecko
application framework, which is used to render Web pages and display
applications.
The platform underpinning Firefox OS, called Boot to Gecko
(B2G), borrows 95 percent of its code from the mobile browser and
Gecko, according to Mozilla.
The mobile OS uses a Linux kernel,
which then boots into the Gecko runtime.
The top layer of the technology
stack, called Gaia, generates the interface seen by users.
Trend
Micro pinpointed what the company believes are avenues for hackers to
exploit.
As more people use smartphones, attackers are increasingly
looking for ways to exploit mobile devices.
"Though the Firefox OS may not enjoy the market of the Android OS,
the use of HTML5 is gradually gaining traction among users (Amazon also
accepts HTML5 for its apps)," wrote
Peter Pi, a threats analyst for Trend. "Thus, regardless of OS, we can
expect that as more apps and sites will use HTML5, we can expect such
attacks to increase in the future."
B2G contains a process within
the OS that enforces permissions granted to applications and prevents
unauthorized requests by those applications, Pi wrote.
Some
applications can request more permissions, but those requests must be
verified and signed by an application store, Pi wrote. The B2G process
has high privileges and vets those requests. Mozilla has acknowledged
B2G is a possible attack vector, he wrote.
"If this process is exploited, an attacker can obtain high-level privileges (like root access)," Pi wrote.
A
vulnerability found last month, which was actually fixed in the course
of repairing a different flaw in June, caused the B2G process to crash.
Pi noted it could have allowed an attacker to run arbitrary code on a
device with the same high privileges as the B2G process.
SOURCES: ComputerWorld
No comments:
Post a Comment