본 사이트는 여러분의 사용자 경험을 개선하기 위해 유지 보수를 진행하는 동안 기능이 제한됩니다. 도움말로 문제가 해결되지 않고 질문을 하고 싶다면 Twitter의 @FirefoxSupport 및 Reddit의 /r/firefox 채널을 활용하세요.

Mozilla 도움말 검색

고객 지원 사기를 피하세요. 저희는 여러분께 절대로 전화를 걸거나 문자를 보내거나 개인 정보를 공유하도록 요청하지 않습니다. "악용 사례 신고"옵션을 사용하여 의심스러운 활동을 신고해 주세요.

자세히 살펴보기

how do I check if I was affected by latest security bug

  • 4 답장
  • 2 이 문제를 만남
  • 3 보기
  • 최종 답변자: Happy112

more options

I have been using firefox 48.0.2 while the latest security threat came into news. Now I have updated already, but how can I make sure that nothing happened during the period while I was using older version of firefox? I do use noscript addons.

I have been using firefox 48.0.2 while the latest security threat came into news. Now I have updated already, but how can I make sure that nothing happened during the period while I was using older version of firefox? I do use noscript addons.

선택된 해결법

hi androdebugur, in case you are referring to the recently disclosed certificate pinning bug, eg. https://hackernoon.com/postmortem-of-the-firefox-and-tor-certificate-pinning-vulnerability-rabbit-hole-bd507c1403b4 i think it is quite improbably that it had practical implications.

for an attack to work, the attacker would need to be in a position to intercept, control and alter your network traffic and obtain a genuine trusted certificate for a mozilla.org domain - if both of these conditions applied i think there are also lots of other things to worry about, not only the integrity of addon updates...

문맥에 따라 이 답변을 읽어주세요 👍 0

모든 댓글 (4)

more options

Hi &nsp; !

As long as you haven't downloaded or clicked on anything suspicious,   like fake updates,  you have nothing to worry about.
You're apparantly on the alert for these kind of things:   good for you   !

more options

선택된 해결법

hi androdebugur, in case you are referring to the recently disclosed certificate pinning bug, eg. https://hackernoon.com/postmortem-of-the-firefox-and-tor-certificate-pinning-vulnerability-rabbit-hole-bd507c1403b4 i think it is quite improbably that it had practical implications.

for an attack to work, the attacker would need to be in a position to intercept, control and alter your network traffic and obtain a genuine trusted certificate for a mozilla.org domain - if both of these conditions applied i think there are also lots of other things to worry about, not only the integrity of addon updates...

more options

Happy112 said

Hi &nsp; !
As long as you haven't downloaded or clicked on anything suspicious,   like fake updates,  you have nothing to worry about.
You're apparantly on the alert for these kind of things:   good for you   !

philipp said

hi androdebugur, in case you are referring to the recently disclosed certificate pinning bug, eg. https://hackernoon.com/postmortem-of-the-firefox-and-tor-certificate-pinning-vulnerability-rabbit-hole-bd507c1403b4 i think it is quite improbably that it had practical implications. for an attack to work, the attacker would need to be in a position to intercept, control and alter your network traffic and obtain a genuine trusted certificate for a mozilla.org domain - if both of these conditions applied i think there are also lots of other things to worry about, not only the integrity of addon updates...


Thank you.

more options

androdebugur said

Thank you.

That is so sweet and highly appreciated   !