The Firefox vulnerability that was exploited affects browser releases prior to the current version 22. The JavaScript found on Freedom Host sites, however, was designed to attack only Version 17 of the extended support release, which was included in a browser bundle offered by the Tor Project. The bundle has recently been updated to include Firefox 17.0.7, a version that has been patched to fix the memory-management vulnerability, according to this thread on the Mozilla security blog. People using Tor should make sure they're using the most up-to-date software. They should also avoid running JavaScript, Flash, and most other browser add-ons when attempting to browse anonymously. The Tor browser bundle includes the NoScript plugin to turn most add-ons off by default. For more information, see this advisory from Tor Project volunteers.
Firefox exploit can uncloak all Tor users
Posted on Tuesday, August 06 2013 @ 13:58 CEST by Thomas De Maesschalck