Mozilla releases Firefox 3.6.11 to address 12 flaws

Share this article:
Mozilla on Tuesday released an updated version of its Firefox web browser to shore up a dozen vulnerabilities.

Firefox 3.6.11 fixes eight “critical” flaws that could result in a remote attacker installing malicious software on victim machines.

Of the remaining flaws, two were rated “high” in severity, one “moderate” and another “low.”

In all, the vulnerabilities could allow an attacker to execute arbitrary code, obtain sensitive information, or cause a denial-of-service condition, according to an advisory posted Wednesday by the US-CERT.

One of the nine bulletins released by Mozilla as part of its security update involved critical library loading vulnerabilities, which could be exploited to execute arbitrary code by tricking a user into running the application or launch script in a directory containing a malicious library, according to an advisory from Danish vulnerability tracking firm Secunia. Another bulletin addressed several critical memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of the bugs could be exploited to run arbitrary code.

The remaining critical bulletins address a “dangling pointer” flaw and a “use-after-free error," both of which could result in the execution of attacker-controlled memory, as well as a buffer overflow, memory corruption bug that could lead to arbitrary code execution.

Mozilla also released Firefox 3.5.14 to address the same vulnerabilities. Some of the flaws also affect Mozilla's SeaMonkey application suite and the Thunderbird email client. The flaws were fixed in Thunderbird 3.1.5 and 3.0.9 and SeaMonkey 2.0.9.

According to the release notes of the browser installment, 3.6.11 also includes several performance and stability improvements.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.

EU conducts massive cyberattack simulation on critical networks

Conducted by the European Union Agency for Network and Information Security, the simulation launched 2,000 attacks on the networks of various critical infrastructure organizations.