Mozilla promises March 30 fix for critical Firefox bug

Powered by SC Magazine
 

As German government advises residents not to use the web browser.

Mozilla plans to patch a critical vulnerability affecting the latest version of its Firefox web browser next week.

The flaw, first discovered by Russian security researcher Evgeny Legerov, could allow an attacker to remotely execute arbitrary code on an affected system.

It will be fixed with the release of Firefox 3.6.2, scheduled for March 30, Mozilla said in a blog post. The vulnerability affects only Firefox 3.6, which was released in January.

Secunia has classified the bug as “highly critical”, giving it 'four' out of five on its severity rating scale. If users do not wish to wait for the late March patch, they were advised by Mozilla to download the beta version of Firefox 3.6.2, which contains the fix.

Legerov first disclosed the vulnerability on February 1 on a message board hosted by Immunity, a US-based security assessment and penetration testing vendor. Legerov provided few details about the bug, however.

“It is a really cool bug," Legerov, founder of Moscow-based security research firm Intevydis wrote in the post. "It was an interesting challenge to find and exploit it. The exploit needs some work, but it was quite reliable in our testing.”

Meanwhile, the German Computer Emergency Response Team has warned users against using Firefox until Mozilla has provided a fix for the bug.

See original article on scmagazineus.com

Copyright © SC Magazine, US edition


Mozilla promises March 30 fix for critical Firefox bug
 
 
 
Top Stories
Microsoft confirms Australian Azure launch
Available from next week.
 
NBN Co names first 140 FTTN sites
National trial extended.
 
Cloud, big data propel bank CISOs into the boardroom
And this time, they are welcome.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  26%
TOTAL VOTES: 247

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  62%
 
No
  38%
TOTAL VOTES: 80

Vote