BTW, is FF3 out of Beta yet? -Clint TITLE: Mozilla Firefox 3 URI Launching and XUL Error Page Vulnerabilities SECUNIA ADVISORY ID: SA31106 VERIFY ADVISORY: http://secunia.com/advisories/31106/ CRITICAL: Highly critical IMPACT: Security Bypass, Spoofing, System access WHERE: From remote SOFTWARE: Mozilla Firefox 3.x http://secunia.com/product/19089/ DESCRIPTION: Some vulnerabilities have been reported in Firefox 3, which can be exploited by malicious people to bypass certain security restrictions, potentially conduct spoofing attacks, or compromise a user's system. 1) A vulnerability can be exploited to launch e.g. "file" or "chrome:" URIs in Firefox. For more information see: SA31120 2) Input passed to XUL based error pages is not properly sanitised before being returned to a user and can be exploited to e.g. conduct spoofing attacks. In combination with vulnerability #1 this can be exploited to inject arbitrary script code and execute arbitrary code in "chrome" context, but requires that a specially crafted URI is passed to Firefox and that Firefox is not running. The vulnerabilities are reported in versions prior to 3.0.1. SOLUTION: Update to version 3.0.1. http://www.mozilla.com/en-US/firefox/ ORIGINAL ADVISORY: MFSA 2008-35: http://www.mozilla.org/security/announce/2008/mfsa2008-35.html ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-