The installed version of Firefox is affected by various security issues :
- By creating a very large number of references to a common CSS object, an attacker can overflow the CSS reference counter, causing a crash when the browser attempts to free the CSS object while still in use and allowing for arbitrary code execution (MFSA 2008-34).
- If Firefox is not already running, passing it a command-line URI with pipe (β|β) symbols will open multiple tabs, which could be used to launch βchrome:iβ URIs from the command-line or to pass URIs to Firefox that would normally be handled by a vector application (MFSA 2008-35).