SHARE
Facebook X Pinterest WhatsApp

Firefox Zero-Day Code Execution Hoax?

A public claim by hackers that Mozilla’s Firefox browser is vulnerable to multiple code execution vulnerabilities may be an overblown hoax. On the heels of a ToorCon presentation where two security researchers—Mischa Spiegelmock and Andrew Wbeelsoi—warned that Firefox’s implementation of JavaScript was badly flawed and could allow PC takeover attacks, Mozilla’s engineers say the risk […]

Written By
thumbnail Ryan Naraine
Ryan Naraine
Oct 3, 2006
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A public claim by hackers that Mozilla’s Firefox browser is vulnerable to multiple code execution vulnerabilities may be an overblown hoax.

On the heels of a ToorCon presentation where two security researchers—Mischa Spiegelmock and Andrew Wbeelsoi—warned that Firefox’s implementation of JavaScript was badly flawed and could allow PC takeover attacks, Mozilla’s engineers say the risk is limited to a denial-of-service issue.

Spiegelmock, a developer at Six Apart, a blog software company in San Francisco, now says the ToorCon talk was meant “to be humorous” and insists the code presented at the conference cannot result in code execution.

Spiegelmock’s strange about-face comes as Mozilla’s security response team is racing to piece together information from the ToorCon talk to figure out how to fix the issue.

Mozilla security chief Window Snyder, who was an attendee at the conference, said the company is treating the claims as real until it can be verified otherwise but, as of Oct. 2, the open-source group could only reproduce a denial-of-service issue that caused a browser crash.

“In some cases this causes a crash based on an out-of-memory error. Based on the information we have at this time we have not been able to confirm whether an attacker can achieve code execution. We’re still investigating,” Snyder said.

A few hours later on Oct. 2, after discussions with Spiegelmock, Snyder said the researcher provided more code along with a note explaining the extent of the risk.

In Spiegelmock’s note, posted to the Mozilla developer blog, the researcher admitted the claims presented at ToorCon were a bit overblown.

“As part of our talk we mentioned that there was a previously known Firefox vulnerability that could result in a stack overflow ending up in remote code execution. However, the code we presented did not in fact do this, and I personally have not gotten it to result in code execution, nor do I know of anyone who has,” Spiegelmock said.

“I have not succeeded in making this code do anything more than cause a crash and eat up system resources, and I certainly haven’t used it to take over anyone else’s computer and execute arbitrary code,” he added.

On the claim that there are 30 undisclosed Firefox vulnerabilities, Spiegelmock pinned that entirely on co-presenter Wbeelsoi. “I have no undisclosed Firefox vulnerabilities. The person who was speaking with me made this claim, and I honestly have no idea if he has them or not. I apologize to everyone involved, and I hope I have made everything as clear as possible,” Spiegelmock added.

Wbeelsoi could not be reached for comment.

“Even though Mischa hasn’t been able to achieve code execution, we still take this issue seriously. We will continue to investigate,” Mozilla’s Snyder added.

Check out eWEEK.com’s for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer’s Weblog.

Recommended for you...

Cisco Targets Critical Infrastructure Needs for AI Era
Cork Marks Three Years Linking MSPs to SMB Cyber Resilience
Victoria Durgin
Oct 31, 2025
Amazon Cuts 14,000 Corporate Jobs Amid AI Push
Allison Francis
Oct 29, 2025
Caylent and Trek10 Join Forces in AWS Partner M&A Deal
Allison Francis
Oct 27, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.