ALL >> Computers >> View Article
Mozilla Patches 8 Critical, 1 High Risk And 1 Moderate Risk Vulnerabilities
Recently, Mozilla released patch for 10 vulnerabilities. The addressed vulnerabilities pertain to Firefox 3.6.14, 3.5.17 and Thunderbird 3.1.8. The developer has rated 8 out of the 10 vulnerabilities as critical. Out of the remaining two, Mozilla has rated one as high and the other as moderate risk security flaw.
The vulnerabilities are associated with JPEG image, plugins and 307 redirects, text run construction, web workers, JavaScript atom map, JavaScript upvarMap and JSON.stringify. The security update also addresses numerous memory safety bugs associated with Firefox 3.6 and 3.5, which cause memory corruption. Attackers could exploit the bug to run arbitrary code. Security professionals at Mozilla also patched a security flaw caused by ParanoidFragmentSink. Usually, ParanoidFragmentSink class is used to clean unsafe HTML. However, it was identified that the class allows javascript URLs in chrome documents. The flaw could be exploited by a malicious extension code. The security update included a patch for a security flaw, which could allow an attacker to use a specially crafted JPEG image to store a malicious code ...
... in the memory and get it executed on a targeted computer system. Firefox and Thunderbird users must update their browsers to protect their computer system from security breaches.
The vulnerabilities were reported by security researchers affiliated to various organizations. Mozilla rates those vulnerabilities as critical, which may be exploited by attackers to execute code and install malicious software in computer systems of users performing normal browsing. The developer ranks those vulnerabilities as high, which track websites visited by a user to either steal information or to inject malicious code on the visited websites. The vibrant threats from cybercriminals could be tackled by proactive identification and timely communication of security flaws. Online degree and training programs may help security experts in improving their soft skills.
Security professionals at Mozilla have addressed the security flaws a week before the Pwn2Own contest, which would be organized as a part of the upcoming CanSecWest security conference. Ethical hackers, computer science degree holders, penetration testers and other IT security professionals are expected to exploit flaws associated with different web browsers such as Mozilla firefox, Google Chrome and Microsoft Internet Explorer along with other software applications during the contest. Developers and sponsors have announced cash prize and other bounties for experts, who manage to breach the security of the products.
Organizations require large number of cyber security experts to deal with the sophisticated challenges from attackers. Introduction of online university degree programs may encourage prospective science and engineering students to undertake research in cyber security and contribute in developing new secure technologies.
Add Comment
Computers Articles
1. Martindale Law Firm Competitive Analysis Data For Legal IndustryAuthor: Den Rediant
2. The Impact Of Digital Transformation In Clinical Trials
Author: Giselle Bates
3. Blending Art, Technology, And Access: A Look At Pure Art Sketch Community And Digital Portals
Author: new aurthors
4. Full Stack Development Company Driving Mvp Success Fast
Author: Rob Stephen
5. You May Need It Consulting Services But You Are Not Aware Of It Yet
Author: Helen Johns
6. Top Pos Dealers Solutions In 2025 | Best Pos Dealers In Hyderabad
Author: pbs
7. Newegg Product Data Scraping For E-commerce Market Intelligence
Author: Den Rediant
8. Coles & Woolworths Pricing Data Scraping For Retail Strategy
Author: Den Rediant
9. Answering_services
Author: brainbell10
10. Api_security
Author: brainbell10
11. Appium
Author: brainbell10
12. Out-of-stock Prediction Using Web Scraping For Inventory Management
Author: Den Rediant
13. Restaurant Data Scraping Api To Monitor Competitors In Real Time
Author: Den Rediant
14. Adobe_xd
Author: brainbell
15. Amazon Sagemaker Services
Author: brainbell10






