firefoxi s vulnerable to arbitrary code execution. The vulnerability in Sanitiser for OpenType (OTS), used by Firefox to help prevent potential exploits in malformed OpenType fonts. A web page containing malicious content could cause Firefox to crash or, under certain conditions, possibly execute arbitrary code with the privileges of the user running Firefox.
code.google.com/p/chromium/issues/detail?id=116524
googlechromereleases.blogspot.com/2012/03/stable-channel-release-and-beta-channel.html
osvdb.org/80740
secunia.com/advisories/48618
secunia.com/advisories/48691
secunia.com/advisories/48763
secunia.com/advisories/48972
secunia.com/advisories/49047
secunia.com/advisories/49055
www.mandriva.com/security/advisories?name=MDVSA-2012:066
www.mandriva.com/security/advisories?name=MDVSA-2012:081
www.mozilla.org/security/announce/2012/mfsa2012-31.html
www.mozilla.org/security/known-vulnerabilities/firefoxESR.html
www.securitytracker.com/id?1026877
access.redhat.com/errata/RHSA-2012:0515
access.redhat.com/security/updates/classification/#critical
bugzilla.mozilla.org/show_bug.cgi?id=739925
exchange.xforce.ibmcloud.com/vulnerabilities/74412
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15488