Mozilla Firefox

2009-12-29T21:51:00
ID MOZILLA-FIREFOX/91643
Type threatpost
Reporter Aaron Stern
Modified 2009-12-29T21:51:27

Description

The JavaScript engine in Mozilla Firefox before 3.0.12 and Thunderbird
allows?remote attackers to cause a denial of service (memory corruption
and application crash) or possibly execute arbitrary code

Mozilla
Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0,
does not properly handle a right-to-left override (aka RLO or U+202E)
Unicode character in a download filename, which allows remote attackers
to spoof file extensions via a crafted filename, as demonstrated by
displaying a non-executable extension for an executable file.
Heap-based buffer overflow in the GIF image parser in Mozilla Firefox
before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows
remote attackers to execute arbitrary code via unspecified vectors.

Related Posts

Apple Patches Trident Vulnerabilities in OS X, Safari

September 2, 2016 , 10:00 am

Serious TCP Bug in Linux Systems Allows Traffic Hijacking

August 10, 2016 , 12:55 pm

Misuse of Language: ‘Cyber’; When War is Not a War, and a Weapon is Not a Weapon

August 9, 2016 , 9:00 am