Mozilla Firefox URI Launching and XUL Error Page Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in Firefox, which can be exploited by malicious people to bypass certain security restrictions, potentially conduct spoofing attacks, or compromise a user's system.
1. A vulnerability can be exploited to launch e.g. "file" or "chrome:" URIs in Firefox.
2. Input passed to XUL based error pages is not properly sanitised before being returned to a user and can be exploited to e.g. conduct spoofing attacks.
In combination with vulnerability #1 this can be exploited to inject arbitrary script code and execute arbitrary code in "chrome" context, but requires that a specially crafted URI is passed to Firefox and that Firefox is not running.
Impact
- Remote Code Execution
- Security Restriction Bypass
- Spoofing
System / Technologies affected
- Mozilla Firefox 3.x
- Mozilla Firefox 2.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 3.0.1 / 2.0.0.16
http://www.mozilla.com/en-US/firefox/
Vulnerability Identifier
Source
Related Link
Share with