It's been a busy month of patching for the Mozilla Foundation.
The latest fixes outlined in three advisories Mozilla issued Wednesday address glitches attackers could exploit to launch malicious code and set the stage for future online assaults.
The first problem
Mozilla credited researcher Mark Dowd from the Internet Security Systems X-Force for reporting the issue. ISS X-Force said in its advisory that "by crafting a .GIF file in a malicious manner, an attacker is able to trigger a heap overflow within the application viewing the image, leading to arbitrary code execution and remote compromise."
The vulnerability has been fixed in Firefox 1.0.2, Thunderbird 1.0.2 and Mozilla Suite 1.7.6.
Mozilla said the second problem is that "a malicious page that could lure a user into dragging something (such as a fake scrollbar) can bypass the restriction on opening privileged XUL." XUL (Extensible User-interface Language) is a standard way to exchange data that describes a program's user interface, or at least the portion of it that can be controlled by programming.
"The startup scripts in the XUL will run with enhanced privilege, though the actions taken upon merely opening most XUL are benign," Mozilla's advisory said. "So far no way to run arbitrary code supplied by the attacker has been found, but this could be a stepping stone to future attacks."
Mozilla credited researcher Michael Krax for reporting this vulnerability, which has been fixed in Firefox 1.0.2 and Mozilla Suite 1.7.6.
Mozilla said researcher Kohei Yoshino reported this vulnerability, which has been fixed in Firefox 1.0.2.
Mozilla has fixed a variety of security holes in recent weeks.
One was a drag-and-drop vulnerability in Thunderbird, Firefox and Mozilla Suite attackers could exploit to plant malware on targeted machines.
The vendor also addressed a "Save Link As" download dialog spoofing vulnerability in Mozilla and Firefox attackers could exploit to trick users into downloading malicious files.