TITLE: Mozilla Firefox Multiple Vulnerabilities Highly critical Impact: DoS, System access, Manipulation of data Where: From remote VERIFY ADVISORY: http://secunia.com/advisories/39136/ DESCRIPTION: Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to manipulate certain data, bypass certain security restrictions, and potentially compromise a user's system. For more information: SA38608 1) An error related to the select event handler for XUL tree items can be exploited to potentially execute arbitrary code. SOLUTION: Update to version 3.5.9. Set the "security.ssl.require_safe_negotiation" preference to "true". ORIGINAL ADVISORY: Mozilla: http://www.mozilla.org/security/announce/2010/mfsa2010-16.html http://www.mozilla.org/security/announce/2010/mfsa2010-17.html http://www.mozilla.org/security/announce/2010/mfsa2010-18.html http://www.mozilla.org/security/announce/2010/mfsa2010-19.html http://www.mozilla.org/security/announce/2010/mfsa2010-20.html http://www.mozilla.org/security/announce/2010/mfsa2010-22.html http://www.mozilla.org/security/announce/2010/mfsa2010-23.html OTHER REFERENCES: SA38400: http://secunia.com/advisories/38400/ SA38608: http://secunia.com/advisories/38608/ ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-