TITLE: Mozilla Firefox Unspecified Code Execution Vulnerability Criticality level: **Extremely critical** Impact: System access Where: From remote http://secunia.com/advisories/41957/ DESCRIPTION: A vulnerability has been reported in Mozilla Firefox, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error and can be exploited to execute arbitrary code by tricking a user into visiting a specially crafted site. NOTE: The vulnerability is currently being actively exploited. SOLUTION: Reportedly, disabling JavaScript or using the "NoScript" addon prevents successful exploitation. ORIGINAL ADVISORY: Mozilla: http://blog.mozilla.com/security/2010/10/26/critical-vulnerability-in-firefox-3-5-and-firefox-3-6/ Norman ASA: http://norman.com/about_norman/press_center/news_archive/2010/129223/en ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-