One of the hackers who demonstrated exploit code for a vulnerability in the way the Firefox browser handles Javascript at a hacker conference in San Diego admitted Tuesday that the presentation was meant to be a joke, according to the chief of security for Mozilla.Mozilla security researchers spent most of Sunday and Monday scrambling to determine if exploit code revealed during a presentation by hackers Mischa Spiegelmock and Andrew Wbeelsoi at Toorcon over the weekend could allow someone to execute malicious code through a memory corruption attack on Firefox.However, Window Snyder, who leads Mozilla’s security team, said Spiegelmock admitted to the company that the presentation was meant to be humorous, and he and Wbeelsoi had not actually achieved remote execution with the exploit code demonstrated at the show.“At best, in some cases it will crash only the client,” Snyder said Tuesday. “That’s all we’ve been able to verify at this point.” Spiegelmock, who works for Six Apart, confirmed as much in his LiveJournal blog, in which he includes a link to a statement he made that is posted on Snyder’s Mozilla blog.“The main purpose of our talk was to be humorous,” according to the statement. “As part of our talk we mentioned that there was a previously known Firefox vulnerability that could result in a stack overflow ending up in remote code execution. However, the code we presented did not in fact do this, and I personally have not gotten it to result in code execution, nor do I know of anyone who has.” During the presentation, the hackers also said they knew of 30 other vulnerabilities in Firefox, but this also was a joke, Snyder said Tuesday.To hear Six Apart spokeswoman Jane Anderson tell it, the Toorcon presentation was a joke invented by two kids barely out of their teens who didn’t understand the ramifications of their actions.“It was all a parody,” she said. Anderson added that Spiegelmock was not representing Six Apart at the show, and the company spent most of Sunday on the phone with Mozilla putting out fires and cooperating with the company to get to the bottom of the matter.To make matters more embarrassing for Six Apart, the company’s earliest investor, Joi Ito, is on Mozilla’s board of directors.Anderson added that Spiegelmock will not be terminated for his actions. “We all make mistakes,” she said.Snyder and the Mozilla team also are being good sports about the ordeal. “Of course, we always prefer that security researchers report vulnerabilities to us so we can create a patch before customers are put at risk,” she said. “But at this point he’s been very cooperative, and we’re pleased he’s chosen to work with us.”Still, Snyder said, “I know people who were working really hard here on Sunday probably have other things they’d rather be doing.”By Elizabeth Montalbano, IDG News Service (New York Bureau)Keep checking in at our Security Feed for updated news coverage. Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe