Mozilla warns of low-risk DoS vulnerability in Firefox 3

Share this article:
Mozilla said Wednesday that it is investigating a new, low-risk vulnerability in its recently released Firefox 3 web browser that could permit an attacker to crash a victim's browser.

The flaw, reported by application delivery solutions provider Radware, could result in a denial-of-service condition if a user is successfully led to the exploit website, the company said in a news release.

The bug is caused by a null pointer dereference error in Firefox's content layout component, according to the Mozilla Security Blog. This means that when an application dereferences a pointer, or a programming language data type that points to an object, it expects it to be valid -- but on a malicious page it would be null.

While Radware says an exploit would lead to the loss of any unsaved information, Mozilla said it includes a feature in Firefox that restores the browser if it crashes, likely resulting in the restoration of any data.

Mozilla said it has assigned a "low" severity rating to the bug and will continue to investigate.

Firefox 3 was released in June.


Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

ISSA tackles workforce gap with career lifecycle program

ISSA tackles workforce gap with career lifecycle program ...

On Thursday, the group launched its Cybersecurity Career Lifecycle (CSCL) program.

Amplification DDoS attacks most popular, according to Symantec

Amplification DDoS attacks most popular, according to Symantec

The company noted in a whitepaper released on Tuesday that Domain Name Server amplification attacks have increased 183 percent between January and August.

Court shutters NY co. selling security software with "no value"

A federal court shut down Pairsys at the request of the Federal Trade Commission.