Firefox 24 addresses 19 bugs with 17 patches

Share this article:
Mozilla plugs nine vulnerabilities ranked "critical" in its web browser.
Mozilla plugs nine vulnerabilities ranked "critical" in its web browser.

Mozilla's latest web browser, Firefox 24, was released this week patching a slew of critical bugs in the product.

Introduced on Tuesday, Firefox 24 plugs 19 vulnerabilities, including 9 "critical" flaws that undermine browser security.

According to a Mozilla security advisory, two of the company's critical Firefox patches rectify use-after-free issues that could lead to a potentially exploitable browser crash, the company said.

Mozilla also addressed two critical memory corruption bugs that could be exploited by an attacker, as well as several memory safety flaws that could allow a saboteur to run malicious code in users' browsers.

“Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products,” the advisory for patch 2013-76 said. “Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code.”

Of the 17 patches implemented with Firefox 24, seven addressed critical vulnerabilities, meaning an attacker could run malicious code or install software of their choosing, and require no user interaction beyond “normal browsing” to carry out the exploit, the advisory said.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.