[PCWorks] Mozilla Firefox Unspecified Code Execution Vulnerability

  • From: "Clint Hamilton-PCWorks Admin" <PCWorks@xxxxxxxxxxxxxxxxxxxxxxxx>
  • To: "PCWorks@xxxxxxxxxxxxx" <pcworks@xxxxxxxxxxxxx>
  • Date: Wed, 27 Oct 2010 23:17:46 -0500

TITLE:
Mozilla Firefox Unspecified Code Execution Vulnerability

Criticality level:  **Extremely critical**
Impact:  System access
Where:  From remote

http://secunia.com/advisories/41957/

DESCRIPTION:
A vulnerability has been reported in Mozilla Firefox, which can be
exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an unspecified error and can be
exploited to execute arbitrary code by tricking a user into visiting
a specially crafted site.

NOTE: The vulnerability is currently being actively exploited.

SOLUTION:
Reportedly, disabling JavaScript or using the "NoScript" addon
prevents successful exploitation.

ORIGINAL ADVISORY:
Mozilla:
http://blog.mozilla.com/security/2010/10/26/critical-vulnerability-in-firefox-3-5-and-firefox-3-6/

Norman ASA:
http://norman.com/about_norman/press_center/news_archive/2010/129223/en


=========================
The list's FAQ's can be seen by sending an email to 
PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line.

To unsubscribe, subscribe, set Digest or Vacation to on or off, go to 
//www.freelists.org/list/pcworks .  You can also send an email to 
PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line.  Your 
member list settings can be found at 
//www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks .  Once logged in, you have 
access to numerous other email options.  

The list archives are located at //www.freelists.org/archives/pcworks/ .  
All email posted to the list will be placed there in the event anyone needs to 
look for previous posts.
-zxdjhu-

Other related posts: