Skip to main content

Mozilla Firefox Multiple Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 6 Mar 2009 5366 Views

RISK: Medium Risk

Multiple vulnerabilities have been identified in Mozilla Firefox, which could be exploited by attackers to bypass security restrictions, disclose sensitive information, cause a denial of service or compromise a vulnerable system.

1. A memory corruption errors in the JavaScript and layout engines when parsing malformed data, which could be exploited by attackers to crash a vulnerable application or execute arbitrary code.

2. A double free error during the garbage collection process when the browser is reloaded while handling a set of cloned XUL DOM elements which were linked as a parent and child, which could be exploited to corrupt memory and execute arbitrary code.

3. A same-origin validation error, which could allow malicious web sites to read arbitrary XML data from another domain by using nsIRDFService and a cross-domain redirect.

4. An errors in the PNG library, which could be exploited by attackers to crash an affected browser or potentially execute arbitrary code.

5. The browser decoding certain invisible control characters when displayed in the location bar, which could allow attackers to spoof the location bar and display a misleading URL for a malicious web page.


Impact

  • Denial of Service
  • Remote Code Execution
  • Security Restriction Bypass
  • Information Disclosure

System / Technologies affected

  • Mozilla Firefox versions prior to 3.0.7

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link