First published: Mon Jun 01 2009(Updated: )
Mozilla add-on developer and community member Wladimir Palant reported that two key security checks are not being called when loading XUL scripts. The checks which are skipped are intended to verify that content loading policies will not be violated by loading a XUL script. Mozilla code relying on the content policies for security, such as privileged add-ons, could potentially be exploited to run JavaScript with elevated privileges.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla SeaMonkey | ||
Mozilla Firefox | =3.0.7 | |
Mozilla Firefox | =3.1-beta1 | |
Mozilla Firefox | =3.0.9 | |
Mozilla Firefox | =3.0.8 | |
Mozilla Firefox | =3.0.4 | |
Mozilla Firefox | =3.0.5 | |
Mozilla Firefox | =3.0-beta2 | |
Mozilla Thunderbird | ||
Mozilla Firefox | =3.0.3 | |
Mozilla Firefox | <=3.0.10 | |
Mozilla Firefox | =3.0.6 | |
Mozilla Firefox | =3.0 | |
Mozilla Firefox | =3.0.1 | |
Mozilla Firefox | =3.0.2 | |
Mozilla Firefox | =3.0beta5 | |
Mozilla Firefox | =3.0-beta5 | |
Mozilla Firefox | =3.0-alpha |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.