Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Major browser providers scramble to patch an 18-year-old vulnerability affecting MacOS and Linux systems but Windows remains gloriously immune
PCGamer ^ | 09 August 2024 | Andy Edser

Posted on 08/09/2024 11:47:02 AM PDT by ShadowAce

We Windows users are sometimes the butt of the joke when it comes to cybersecurity issues. Or at least, we often used to be. Still, if I receive one more lecture on why Linux or Mac systems are more secure, I'll at least have this article to point to. Not always, I shall say. Not always.

Oligo Security's research team has discovered a “0.0.0.0 Day” vulnerability that affects Google Chrome/Chromium, Mozilla Firefox and Apple Safari browsers, enabling websites to communicate with software running on MacOS and Linux systems (via The Hacker News).

The vulnerability means public websites using .com domains are able to communicate with services running on the local network by using the IP address 0.0.0.0 instead of localhost/127.0.0.1.

The good news, if you're a Windows user at least, is that Microsoft's OS blocks 0.0.0.0 at a system level. Hooray for the sometimes-rarer-than-we'd-like Microsoft security win. The bad news for the rest of you is that this loophole is said to have been exploitable since 2006, which means it has been an active cybersecurity vulnerability for an astonishing 18 years.

It's said that the percentage of websites that communicate using 0.0.0.0 is on the rise. Looking at Chromium counters, Oligo has identified 0.015% of websites that could potentially be malicious. That might not sound like a lot, but according to the team, there are an estimated 200 million active websites as of August 2024. 

That's potentially 100,000 websites communicating over that particular IP address, although how many of them are using that capability for nefarious purposes is currently unknown.

Oligo disclosed its findings to security teams from each of the major browsers affected in April 2024, which the company says was acknowledged by each, and that changes are underway to plug the vulnerability.

However, it's up to browser developers to implement their respective fixes, and those fixes have been rolling out to different browsers at different times.  Chrome is already blocking access to 0.0.0.0—starting with Chromium 128—and Google plans to gradually roll out the change with completion set for Chrome 133.

Apple-based browsers like Safari use Webkit, which has already blocked 0.0.0.0. since the report. As for Mozilla Firefox, there is currently no immediate fix, but Mozilla has changed the Fetch specification to block 0.0.0.0 attempts. According to Oligi, "at an undetermined point in the future, 0.0.0.0 will be blocked by Firefox."

Call me slightly smug, but given some high-profile Windows cybersecurity-related failures of late I'll take any win I can get. If you're a Windows PC user, it's finally time to take a victory lap. This one's not on us, folks, and we can rest easy in our beds tonight.


TOPICS: Computers/Internet
KEYWORDS: 0000; browser; windows; windowspinglist
Navigation: use the links below to view more comments.
first 1-2021-35 next last

1 posted on 08/09/2024 11:47:02 AM PDT by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; JosephW; martin_fierro; Still Thinking; zeugma; Vinnie; ironman; Egon; raybbr; AFreeBird; ...

2 posted on 08/09/2024 11:47:15 AM PDT by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

3 posted on 08/09/2024 11:52:40 AM PDT by z3n (Kakistocracy)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce

Well, I sure thought this was a Bee article!


4 posted on 08/09/2024 11:52:57 AM PDT by Attention Surplus Disorder (The Democrat breadlines will be gluten-free. )
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Slightly off subject, but Apple commercials are running saying that their Safari browser is “secure” or something like that. What’s up with that?


5 posted on 08/09/2024 11:59:20 AM PDT by cymbeline (we saw men break out of a concentration camp.”)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

6 posted on 08/09/2024 12:00:09 PM PDT by Billthedrill
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

“Oligo Security’s research team has discovered a “0.0.0.0 Day” vulnerability that >affects Google Chrome/Chromium, Mozilla Firefox and Apple Safari browsers<, enabling websites to communicate with software running on MacOS and Linux systems (via The Hacker News).”

Isn’t this the fault of the Browser allowing it not the OS? Isn’t it the responsibility of a browser to keep the OS it was versioned for insulated? Pretty hard to pin this one on the OS because the browser devs left a hole open in particular versions.


7 posted on 08/09/2024 12:02:16 PM PDT by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Openurmind
The good news, if you're a Windows user at least, is that Microsoft's OS blocks 0.0.0.0 at a system level.

If one OS blocks it, it's pretty hard to NOT blame the OS...

It does seem like a browser exploit though.

8 posted on 08/09/2024 12:04:55 PM PDT by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 7 | View Replies]

To: ShadowAce

one victory lap finally, after years and decades of being repeatedly lapped.


9 posted on 08/09/2024 12:05:14 PM PDT by PIF (They came for me and mine ... now its your turn)
[ Post Reply | Private Reply | To 1 | View Replies]

>> If you’re a Windows PC user, it’s finally time to take a victory lap.

I recommend making it a short lap


10 posted on 08/09/2024 12:06:32 PM PDT by Gene Eric (Don't be a statist! )
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

like china going to the moon, in terms of timeliness.


11 posted on 08/09/2024 12:06:55 PM PDT by xoxox
[ Post Reply | Private Reply | To 1 | View Replies]

To: cymbeline
Slightly off subject, but Apple commercials are running saying that their Safari browser is “secure” or something like that. What’s up with that?

I am one of those that don't touch Apple products, but it looks they already fixed it.

Apple-based browsers like Safari use Webkit, which has already blocked 0.0.0.0. since the report.

12 posted on 08/09/2024 12:13:39 PM PDT by higgmeister (In the Shadow of The Big Chicken! )
[ Post Reply | Private Reply | To 5 | View Replies]

To: ShadowAce; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; AppyPappy; arnoldc1; ATOMIC_PUNK; ..
Browser OS vuln ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

thanks to ShadowAce for the ping!

13 posted on 08/09/2024 12:14:25 PM PDT by dayglored (“Courtesy is owed. Respect is earned. Love is given.” - Kinky Friedman 1944-2024)
[ Post Reply | Private Reply | To 1 | View Replies]

To: cymbeline

Everything is secure compared to windows.

>80% of all viruses target Windows because that’s what most people use and they have most the market share for desktops. Not a lot of viruses being written today targeting AtariTOS for some odd reason.

There are >10,000 viruses out there and it’s a matter of degrees, not all or nothing.


14 posted on 08/09/2024 12:16:22 PM PDT by Red6
[ Post Reply | Private Reply | To 5 | View Replies]

To: ShadowAce

From DOS to Windows 11 Microsoft’s software is a hackers paradise.


15 posted on 08/09/2024 12:16:37 PM PDT by antidemoncrat
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

> we (Windows folks) can rest easy in our beds tonight.

enjoy it while it lasts


16 posted on 08/09/2024 12:17:51 PM PDT by dayglored (“Courtesy is owed. Respect is earned. Love is given.” - Kinky Friedman 1944-2024)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

“we can rest easy in our beds tonight”

I’ve supported just about every Windows OS since 3.x running inside DOS. Given Microsoft’s security history, I wouldn’t recommend resting easy tonight or any night.


17 posted on 08/09/2024 12:21:45 PM PDT by chrisser (I lost my vaccine card in a tragic boating accident.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

“It does seem like a browser exploit though. “

That is how I see it. This claims it utilizes the browsers. So this means there are discrepancies in the browser work they did for one OS version compared to the work they did for the other OS versions of that browser. I don’t think it so much that Windows is more resistant. I think it is more like they left holes in the browser for the others that they happened to not leave open for windows.

And that would stand to reason considering history. They have always been late to the party or reluctant to accommodate alternative operating systems. Everything other than windows is a red headed step child. lol


18 posted on 08/09/2024 12:25:06 PM PDT by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 8 | View Replies]

To: ShadowAce

I just got an updated download from Apple for my MacBook Air last night so I guess the problem has been corrected.


19 posted on 08/09/2024 12:30:55 PM PDT by Captain Peter Blood
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

🛌🛌🛌


20 posted on 08/09/2024 12:33:05 PM PDT by smokingfrog ( sleep with one eye open (<o> --- )
[ Post Reply | Private Reply | To 16 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-35 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson