The Firefox 220.127.116.11 update fixes a problem in the way Firefox handles the uniform resource indicators (URI) that are used to launch other applications when an unsupported file type is loaded.
The URI vulnerability was originally discovered as a "cross-browser" flaw in which an attacker could use a specially crafted internet address in Internet Explorer to launch Firefox without security protections and run malicious code.
Mozilla had pointed out the flaw in the 18.104.22.168 update, claiming that any further fixes would be the responsibility of Microsoft.
Following the 22.214.171.124 release, however, security researcher Jesper Johansson pointed out that the URI handler in Firefox remained just as vulnerable as Internet Explorer.
The problem, noted Johannson, was that Firefox did not properly format the URI address, allowing an attacker to potentially insert multiple malicious instructions.
In addition to fixing the way URI addresses are displayed, the 126.96.36.199 update also repairs a vulnerability that would allow an attacker escalate privileges through a specially crafted about:blank window. That vulnerability is listed as "moderate," the second of Mozilla's four alert levels.
No other security or performance fixes were included in the update.
Mozilla seals off URI flaws again
By Shaun Nichols on Aug 1, 2007 12:00PM