TITLE: Mozilla Firefox Multiple Vulnerabilities Highly critical Impact: System access, Security Bypass Where: From remote VERIFY ADVISORY: http://secunia.com/advisories/39240/ DESCRIPTION: Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to manipulate certain data, bypass certain security restrictions, and potentially compromise a user's system. For more information: SA38608 1) An error related to the select event handler for XUL tree items can be exploited to potentially execute arbitrary code. 2) An error related to the XMLHttpRequestSpy object can be exploited to execute arbitrary JavaScript code with chrome privileges. Successful exploitation requires that the "Firebug" addon is installed. SOLUTION: Update to version 3.0.19. ORIGINAL ADVISORY: Mozilla: http://www.mozilla.org/security/announce/2010/mfsa2010-16.html http://www.mozilla.org/security/announce/2010/mfsa2010-17.html http://www.mozilla.org/security/announce/2010/mfsa2010-18.html http://www.mozilla.org/security/announce/2010/mfsa2010-19.html http://www.mozilla.org/security/announce/2010/mfsa2010-20.html http://www.mozilla.org/security/announce/2010/mfsa2010-21.html OTHER REFERENCES: SA38608: http://secunia.com/advisories/38608/ ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-