Firefox 3.0.4 closes nine security holes
The Mozilla Foundation has released Firefox version 3.0.4 to close nine security holes. The developers rated four of the holes as critical because they allow attackers to execute arbitrary code on the victim's system. One of the critical holes is a classical buffer overflow that can be triggered via specially crafted server responses.
Two additional critical holes were closed in Firefox 220.127.116.11 and SeaMonkey 1.1.13. While both vulnerabilities are caused by memory corruptions and mainly lead to program crashes, the developers didn't rule out that they could be exploited to infect systems. Specially crafted Shockwave and other files could corrupt the Flash player plug-in but give the browser continued access to the now essentially unmapped memory area.
Several of the flaws are also contained in the Thunderbird mail client and are to be fixed in version 18.104.22.168. Usually, updated Thunderbird versions are only released a few days after the respective browser version – and this one is no exception.
Users of Firefox 2.x should consider upgrading to version 3.x. The developers have announced that they will cease to support 2.x in mid-December. There will be no more security updates after this time. Although the developers discussed extending the support window – for example because Thunderbird still uses the old version of the Gecko engine – it seems that this idea has been discarded.
- Known Vulnerabilities in Mozilla Products, overview of the security holes contained in Mozilla products