Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to conduct spoofing attacks or potentially compromise a user's system.
1) An error when opening a new window for a malformed domain can be exploited to display an arbitrary URL in the address bar of a child window by issuing a "window.open()" call with a domain containing e.g. "%20" characters.
2) Various unspecified errors in the browser engine may result in memory corruption and could possibly allow execution of arbitrary code.
NOTE: A bug when receiving replies containing DNS names longer than 15 characters from SOCKS5 proxies may corrupt the subsequent data stream in the response. According to the vendor, there was no evidence of memory corruption.
Solution: Update to version 3.5.2 or 3.0.13.
Provided and/or discovered by: 1) Juan Pablo Lopez Yacubian
2) The vendor credits Lucas Adamski, Bob Clary, Tobias Markus, and Bob Clary.
3) The vendor credits Wladimir Palant and moz_bug_r_a4.
Original Advisory: Mozilla:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Mozilla Firefox Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.