News Stay informed about the latest enterprise technology news and product updates.

Mozilla patches 11 Firefox security flaws, JavaScript errors

Mozilla patched 11 flaws including six critical vulnerabilities that could be exploited by an attacker to gain access to system files.

Mozilla Foundation updated its Firefox browser late Thursday, deploying fixes to 11 vulnerabilities, including six critical flaws, mostly JavaScript related, which could be used by an attacker to run arbitrary code and gain access to system files.

Firefox 3.0.11 patches critical memory corruption errors, a race condition and a JavaScript chrome privilege escalation. Most user browsers will be updated automatically to the latest version.

In its list of advisories, Mozilla said the JavaScript chrome privilege escalation allows scripts from page content to run with elevated privileges. Several memory corruption errors were fixed, stabilizing the browser engine.

Recent FireFox updates:
FireFox 3.0.10 - Mozilla patches a dozen Firefox vulnerabilities: The flaws expose users to URL spoofing, cross-site scripting, code injection and code execution attacks.

FireFox 3.0.9 - Firefox update addresses several security flaws Mozilla's release repairs a critical vulnerability that could have been exploited to run arbitrary code.

FireFox 3.0.8 -
Firefox update blocks proof-of-concept code: Mozilla updated Firefox to repair several flaws, including a critical zero-day flaw.

"Some of these crashes showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code," Mozilla said.

Mozilla said a race condition existed, allowing an attacker to write to freed memory under a certain condition if a person navigated away from a webpage during the loading of a Java applet. The browser maker also repaired a condition in which event listeners may be executed within the wrong JavaScript context.

"An attacker could potentially use this vulnerability to have a malicious event handler execute arbitrary JavaScript with chrome privileges," Mozilla said. Less critical vulnerabilities included:

  • CVE-2009-1834: URL spoofing with invalid unicode characters. An error exists allowing an attacker to display part of an Internationalized Domain Name as whitespace in the location bar, allowing an attacker to spoof a URL. Mozilla rated the flaw low.

  • CVE-2009-1835: Arbitrary domain cookie access by a local file. Mozilla said this flaw required a lot of user interaction to be exploited by an attacker. A user would have to download a malicious file and open it in their browser. It could then steal arbitrary cookies from the victim's computer. The flaw was given a moderate rating.

  • CVE-2009-1839: Incorrect principal set for file. The vulnerability is difficult to exploit, according to Mozilla. It can be exploited if a user downloaded a malicious document and then opened another document in a directory of interest to the attacker before opening the attacker's file in the same window. This flaw was given a moderate rating.

  • CVE-2009-1840: XUL scripts bypass content-policy checks. Mozilla said content-loading policies were not checked before loading external script files into XUL documents. The flaw was given a low rating.

Dig Deeper on Web browser security

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.