Apple, Mozilla patch browser security problems

Share this article:

Apple and Mozilla on Wednesday issued patches to their browser products, Safari and Firefox.

For Apple's Safari, the patch fixes vulnerabilities that could be exploited to launch cross-site scripting attacks or execute arbitrary code, activated when a user visits a malicious website.

The problem lies in the WebKit open-source HTML rendering engine used by Safari. Specifically, an error exists in the handling of URLs containing a colon character in the host name, according to vulnerability tracking firm Secunia.

This can be exploited to conduct cross-site scripting attacks when a specially crafted URL is opened. Also, an integer overflow error exists that can be exploited to cause a buffer overflow via specially written regular expressions.

Apple's patches fix the Windows version of Safari, as well as the version designed for Macs, which are affected to a lesser degree. Four vulnerabilities patched affect the Windows version, while only two impact the Safari for Mac version.

Windows users can obtain the latest version using the bundled Apple Software Update application, while Mac users get it with a built-in software update feature.

The Firefox update fixes vulnerability in the way Firefox handles JavaScript garbage collection, which can be exploited to cause memory corruption and possibly allow execution of arbitrary code.

According to Mozilla, "This is being fixed primarily to address stability concerns. We have no demonstration that the garbage collection crash is exploitable, but are issuing this advisory because some crashes of this type have been shown to be exploitable in the past."

The vulnerability affects version 2.0.0.13, though prior versions may also be affected.

Mozilla's Thunderbird email client shares the Firefox browser engine and could be vulnerable if JavaScript is enabled in email. The fix is contained in Firefox 2.0.0.14.

 

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

EPIC: driver data shared via V2V technology needs protection

The groups shared comments on V2V communications with the National Highway Traffic Safety Administration.

Researchers observe recently patched Adobe bug added to exploit kits

Researchers have indicated that a recently patched integer overflow in Adobe Flash Player has been added to exploit kits.

SEDNIT malware delivered in 'Operation Pawn Storm'

SEDNIT malware delivered in 'Operation Pawn Storm'

Military, governments and media from around the world are targets in a campaign identified by Trend Micro.