Feb 23, 2007 (12:02 PM EST)
Mozilla Security Update Fixes 7 Vulnerabilities
Read the Original Article at InformationWeek
Mozilla rolled out the latest security update for its Firefox browser this week, patching seven vulnerabilities.
This round of patches is for Firefox 220.127.116.11 and Firefox 18.104.22.168 users. The updates are automatically deployed, but users also can go to this Web site and manually download them.
"We strongly recommend that all Firefox users upgrade to this latest release," said Mike Schroepfer, VP of engineering at Mozilla, in a statement e-mailed to InformationWeek. "This update resolves the location.hostname vulnerability and other security and stability issues. Thanks to the work of our contributors, we have been able to address these issues quickly in order to minimize the security risk to Firefox users."
The security update only repairs the current list of known flaws.
The security update for the open source browser originally was slated to be released Feb. 21 but was pushed back to accommodate a fix for the location.hostname vulnerability. Michal Zalewski, a Polish security researcher, was the first to disclose the vulnerability last week on his mailing list, Full Disclosure. He wrote that the flaw is in the most recent version of the Firefox browser -- 22.214.171.124 -- but added that it affects other recent versions, as well.
The vulnerability allows malicious Web sites to manipulate authentication cookies for third-party sites.
On Thursday, Zalewski posted information on a memory-corruption issue that crashes the browser and puts users at risk of hackers gaining remote control of the infected machines.
"I noticed that Firefox is susceptible to a pretty nasty, and apparently easily exploitable memory corruption vulnerability," he writes. "When a location transition occurs and the structure of a document is modified from within onUnload event handler, freed memory structures are left in inconsistent state, possibly leading to a remote compromise."
Mozilla says it's working on that bug as well.