Firefox Flaw Carries Code Execution Risk

Mozilla releases Firefox to correct a "critical" denial-of-service vulnerability that could have serious ramifications.

A new version of the upstart Firefox Web browser has been released to patch a "critical" flaw that could lead to the execution of malicious code.

According to Mozilla, Firefox fixes a publicly reported denial-of-service bug that can theoretically lead to a more serious security issue.

Mozilla described the flaw as crashes that were discovered to ultimately stem from the same root cause: attempting to use a deleted controller context when designMode was turned on.

"This generally results in crashing the browser, but in theory references to deleted objects can be abused to run malicious code," the open-source group said in an advisory.

Older clients, including Firefox 1.0.x and the Mozilla Suite 1.7.x, are not affected.

The patch comes just weeks after the release of Firefox as a "significant security and stability" update.

/zimages/5/28571.gifRead more here about Firefoxs most recent security makeover.

Firefox also shipped with native support for Macintosh with Intel Core processors and improvements to product stability. In addition, it was fitted with several improvements for the Japanese locale, and fixed common crashes performance, including several known memory leak issues.

/zimages/5/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at Security Center Editor Larry Seltzers Weblog.