Firefox 16 re-released fixing multiple vulnerabilities
The latest version of Firefox, version 16, returned to Mozilla‘s servers with the release of Firefox 16.0.1 after the discovery of vulnerabilities caused the organization to remove the just-released update for the Web browser from circulation. Mozilla described the problem as that of a malicious Web site being able to potentially determine the URLs and parameters used and suggested downgrading to Firefox 15.0.1, despite the numerous critical bugs fixed in Firefox 16. October 10, a security researcher posted a proof-of-concept, which demonstrated that Firefox 16 was insecure with its location variables, allowing an attacker to open a window pointing at part of another site, wait for that site to redirect the window to a ―logged in‖ page, and then retrieve the new location and data. Accessing the location information should normally be prevented by the browser‘s ―Same Origin‖ policy. Mozilla‘s advisory said a similar but separate critical flaw was found in Firefox 16, Firefox ESR 10.0.8, SeaMonkey 2.13, Thunderbird 16, and Thunderbird ESR 10.0.8 and earlier, which not only disclosed the location object, but, in Firefox 15 and earlier, had the potential for arbitrary code execution. Firefox 16.0.1 closes both holes. These were not the only holes fixed in 16.0.1; another security advisory said developers also identified two of the top crashing bugs in the browser engine and that these bugs showed signs of having corrupted memory. Mozilla concluded that it could be possible to exploit these holes to execute code.
Source: http://www.h-online.com/security/news/item/Firefox-16-re-released-fixingmultiple-vulnerabilities-1728382.html
Discover more from Chad M. Barr
Subscribe to get the latest posts sent to your email.