The most serious issue could lead to remote code execution attacks, according to warning from the open-source browser software maker. In other scenarios, the bugs could cause denial-of-service or URL spoofing attacks.
Here are the details on the Firefox 3.5.6 security fixes, which affect all platforms (Windows, Mac and Linux):
window.opener
property. Using this reference, content in the new window can access functions inside the chrome window, such as eval
, and use these functions to run arbitrary JavaScript code with chrome privileges. In a stock Mozilla browser a remote attacker can not cause these application dialogs to appear nor to automatically load the attack code that takes advantage of this flaw in window.opener
. There may be add-ons which open potentially hostile web-content in this way, and combined with such an add-on the severity of this flaw could be upgraded to Critical.document.location
to a https: URL which responds with a 204 status and empty response body, the insecure page will receive SSL indicators near the location bar, but will not have its page content modified in any way. This could lead to a user believing they were on a secure page when in fact they were not. Separately, a web page can set document.location
to a URL that can't be displayed properly and then inject content into the resulting blank page. An attacker could use this vulnerability to place a legitimate-looking but invalid URL in the location bar and inject HTML and JavaScript into the body of the page, resulting in a spoofing attack.GeckoActiveXObject
differ based on whether or not the requested COM object's ProgID is present in the system registry. A malicious site could use this vulnerability to enumerate a list of COM objects installed on a user's system and create a profile to track the user across browsing sessions.Mozilla is distributing the patches via the browser's built-in automatic update mechanism. End users (Mac, Windows and Linux) should apply the update urgently.