Mozilla plugs Firefox flaws Staff

Mozilla has released Firefox to fix several security flaws attackers could have exploited to conduct cross-site request forgery attacks and potentially hijack a user's computer.

Mozilla Foundation Security Advisory 2007-38

    Requires Free Membership to View

outlined three memory corruption and crash conditions it addressed to improve the browser's stability. "These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code," Mozilla said.

Mozilla Foundation Security Advisory 2007-39 said it was possible to generate a fake HTTP referer header by exploiting a timing condition when setting the "window.location" property and that attackers could have exploited it to conduct a cross-site request forgery attack against Web sites that rely only on the referer header as protection against such attacks.

"When navigation occurs due to setting window.location, the referer header is supposed to reflect the address of the content which initiated the script," Mozilla said. "Instead, the referer was set to the address of the window (or frame) in which the script was running."

Danish vulnerability clearinghouse Secunia described the problem in its SA27725 advisory as a race condition when setting the "window.location" property, and that attackers could exploit it to generate a fake HTTP Referer header, which could then be used to conduct cross-site request forgery attacks.

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: