TITLE: Mozilla Firefox 2 URI Launching Vulnerability SECUNIA ADVISORY ID: SA31120 VERIFY ADVISORY: http://secunia.com/advisories/31120/ CRITICAL: Less critical IMPACT: Security Bypass, Exposure of sensitive information WHERE: From remote SOFTWARE: Mozilla Firefox 2.0.x http://secunia.com/product/12434/ DESCRIPTION: A vulnerability has been reported in Firefox 2, which can be exploited by malicious people to bypass certain security restrictions and disclose sensitive information. The problem is that it is possible to open multiple tabs via pipe symbols within the URI and can e.g. be exploited to launch "chrome:" URIs via the command-line. This can also be exploited to read files from a user's system using the "file:" URI but requires that an attacker is able to place a malicious file in a guessable location on a user's system (e.g. in combination with another security issue). Successful exploitation requires that the URI is passed to Firefox from e.g. another browser and that Firefox is not running. The vulnerability is reported in versions prior to 2.0.0.16. SOLUTION: Update to version 2.0.0.16. http://www.mozilla.com/en-US/firefox/all-older.html ORIGINAL ADVISORY: MFSA 2008-35: http://www.mozilla.org/security/announce/2008/mfsa2008-35.html ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-