Apple and Mozilla on Wednesday issued patches to their browser products, Safari and Firefox.
For Apple's Safari, the patch fixes vulnerabilities that could be exploited to launch cross-site scripting attacks or execute arbitrary code, activated when a user visits a malicious website.
The problem lies in the WebKit open-source HTML rendering engine used by Safari. Specifically, an error exists in the handling of URLs containing a colon character in the host name, according to vulnerability tracking firm Secunia.
This can be exploited to conduct cross-site scripting attacks when a specially crafted URL is opened. Also, an integer overflow error exists that can be exploited to cause a buffer overflow via specially written regular expressions.
Apple's patches fix the Windows version of Safari, as well as the version designed for Macs, which are affected to a lesser degree. Four vulnerabilities patched affect the Windows version, while only two impact the Safari for Mac version.
Windows users can obtain the latest version using the bundled Apple Software Update application, while Mac users get it with a built-in software update feature.
According to Mozilla, "This is being fixed primarily to address stability concerns. We have no demonstration that the garbage collection crash is exploitable, but are issuing this advisory because some crashes of this type have been shown to be exploitable in the past."
The vulnerability affects version 126.96.36.199, though prior versions may also be affected.