Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, and potentially compromise a user's system.
2) An error in the "addEventListener" method can be exploited to inject script into another site, circumventing the browser's same-origin policy. This could be used to access or modify sensitive information from the other site.
3) An error in the handling of XUL popups can be exploited to spoof parts of the browser such as the location bar.
Solution: Update to version 184.108.40.206 or 220.127.116.11.
Provided and/or discovered by: The vendor credits:
1) Boris Zbarsky, Eli Friedman, Georgi Guninski, Martijn Wargers, Olli Pettay, Brendan Eich, Igor Bukanov, Jesse Ruderman, moz_bug_r_a4, and Wladimir Palant
3) Chris Thomas
Original Advisory: 1) http://www.mozilla.org/security/announce/2007/mfsa2007-12.html
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Mozilla Firefox Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.