The security researcher who found and reported this critical buffer overflow and memory corruption vulnerability in Mozilla’s Firefox browser is none other than Alex Miller, a 12-year-old boy who earned a $3,000 bounty for his discovery.
According to the San Jose Mercury News, Miller was motivated to search for Firefox security holes after Mozilla increased its bug bounty from $500 to $3,000.
The seventh grader, described as a “Firefox loyalist,” had previously reported a Firefox vulnerability but that one did not qualify for the cash payout.
"Alex returned to the computer and his exploration. By Alex’s estimation he spent about 90 minutes each day for about 10 days until he spotted it–a flaw in the memory of the running program".
The vulnerability, which can be exploited to crash a slave’s browser and potentially run arbitrary code on their computer, was patched this week in:
* Firefox 3.6.11
* Firefox 3.5.14
It also affects:
* Mozilla’s Thunderbird 3.1.5
* Thunderbird 3.0.9
* SeaMonkey 2.0.9
Resource : http://www.zdnet.com