Mozilla Firefox and Seamonkey Multiple Vulnerabilities
RISK: Medium Risk
Two vulnerability has been identified in Mozilla Firefox and Seamonkey, which could be exploited by remote attackers to cause a denial of service or potentially compromise a vulnerable system.
1. A memory corruption error within the "txMozillaXSLTProcessor::TransformToDoc()" function when processing specially crafted XSLT Transforms, which could be exploited by attackers to crash an affected browser or potentially execute arbitrary code by tricking a user into visiting a specially crafted web page.
2. An error in the processing of the XUL tree method "_moveToEdgeShift()" which could be exploited by attackers to crash an affected browser or potentially execute arbitrary code by tricking a user into visiting a specially crafted web page.
Note: This vulnerability only affect Mozilla Firefox version 3.0.7 and prior.
Impact
- Denial of Service
- Remote Code Execution
System / Technologies affected
- Mozilla Firefox version 3.0.7 and prior
- Mozilla SeaMonkey version 1.1.15 and prior
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to Mozilla Firefox version 3.0.8 :
http://www.mozilla.com/firefox/
Vulnerability Identifier
Source
Related Link
Share with