Mozilla has released Firefox 220.127.116.11 to fix several security flaws attackers could have exploited to conduct cross-site request forgery attacks and potentially hijack a user's computer.
Mozilla Foundation Security Advisory 2007-38 outlined three memory corruption and crash conditions it addressed to improve the browser's stability. "These crashes showed some evidence of memory corruption under certain circumstances and we presume that with enough effort at least some of these could be exploited to run arbitrary code," Mozilla said.
Mozilla Foundation Security Advisory 2007-39 said it was possible to generate a fake HTTP referer header by exploiting a timing condition when setting the "window.location" property and that attackers could have exploited it to conduct a cross-site request forgery attack against Web sites that rely only on the referer header as protection against such attacks.
"When navigation occurs due to setting window.location, the referer header is supposed to reflect the address of the content which initiated the script," Mozilla said. "Instead, the referer was set to the address of the window (or frame) in which the script was running."
Danish vulnerability clearinghouse Secunia described the problem in its SA27725 advisory as a race condition when setting the "window.location" property, and that attackers could exploit it to generate a fake HTTP Referer header, which could then be used to conduct cross-site request forgery attacks.