Firefox OS likely to face HTML5, Boot-to-Gecko process attacks

Trend Micro predicts where hackers will look for weak points in the mobile OS
  • Jeremy Kirk (IDG News Service)
  • — 11 September, 2013 05:56

The Firefox OS, a new contender in mobile operating systems, will likely see HTML5-related attacks and assaults on a crucial operating system process, according to security vendor Trend Micro.

Some mobile phone operators are already shipping devices with the Firefox OS, which comes from Mozilla, the nonprofit organization behind the Firefox desktop browser.

Mozilla's Firefox OS seeks to challenge the dominance of Android and iOS, Google and Apple's operating systems. Firefox OS is geared toward high-performance, low-cost phones running applications using the HTML5 web programming language.

Firefox OS borrows much from the Firefox mobile browser and Gecko application framework, which is used to render Web pages and display applications. The platform underpinning Firefox OS, called Boot to Gecko (B2G), borrows 95 percent of its code from the mobile browser and Gecko, according to Mozilla.

The mobile OS uses a Linux kernel, which then boots into the Gecko runtime. The top layer of the technology stack, called Gaia, generates the interface seen by users.

Trend Micro pinpointed what the company believes are avenues for hackers to exploit. As more people use smartphones, attackers are increasingly looking for ways to exploit mobile devices.

Firefox OS is built around HTML5, the latest version of the open standard web programming language that is designed to be more interactive and multimedia friendly.

"Though the Firefox OS may not enjoy the market of the Android OS, the use of HTML5 is gradually gaining traction among users (Amazon also accepts HTML5 for its apps)," wrote Peter Pi, a threats analyst for Trend. "Thus, regardless of OS, we can expect that as more apps and sites will use HTML5, we can expect such attacks to increase in the future."

B2G contains a process within the OS that enforces permissions granted to applications and prevents unauthorized requests by those applications, Pi wrote.

Some applications can request more permissions, but those requests must be verified and signed by an application store, Pi wrote. The B2G process has high privileges and vets those requests. Mozilla has acknowledged B2G is a possible attack vector, he wrote.

"If this process is exploited, an attacker can obtain high-level privileges (like root access)," Pi wrote.

A vulnerability found last month, which was actually fixed in the course of repairing a different flaw in June, caused the B2G process to crash. Pi noted it could have allowed an attacker to run arbitrary code on a device with the same high privileges as the B2G process.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Tags: security, Mobile OSes, Exploits / vulnerabilities, mobile, mozilla

Storing in the cloud securely: 30 services compared

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Identity & Security Management

Identity and Security Management

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.