Yeah most of the buttons on this page doesn't work because I turned off Java. I do hope they come out with a new patch soon this is kind of a pain. Actually I think this is a testimony as to how much I like tabbed browsing.
Then instead of turning off javascript use option 2/
2/ Don't allow sites to install software. Disable by making menu choices below:
Tools ->Options -> unclick Allow websites to install software
You don't need to do both, either one will do.
In fact unless you enabled sites not preconfigured by Mozilla to perform software downloads the bug can't hit you now anyhow. Mozilla disabled the authorized sites (which were their own). Now attempts to activate the bug fail because the actual site linkage cannot be made, unless of course you have other authorized sites that you have added yourself.
Release candidates for V1.04 are in testing to fix this bug.
My goodness I thought this was fixed in this version ( 1.03). WTF is going on here?!
Thank you for letting me rant.
Jerry
Feel free to rant toasty. But do answer one question for me.
Here is the list of bugs reported fixed in 1.03
Fixed in Firefox 1.0.3
MFSA 2005-33 Javascript "lambda" replace exposes memory contents
MFSA 2005-34 javascript: PLUGINSPAGE code execution
MFSA 2005-35 Showing blocked javascript: popup uses wrong privilege context
MFSA 2005-36 Cross-site scripting through global scope pollution
MFSA 2005-37 Code execution through javascript: favicons
MFSA 2005-38 Search plugin cross-site scripting
MFSA 2005-39 Arbitrary code execution from Firefox sidebar panel II
MFSA 2005-40 Missing Install object instance checks
MFSA 2005-41 Privilege escalation via DOM property overrides
Which one(s) do you think was not actually fixed and caused the current issue? I can't seem to spot it (them).
To help you out here are the description of the current bugs from Secunia
1) The problem is that "IFRAME" JavaScript URLs are not properly protected from being executed in context of another URL in the history list. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an arbitrary site.
2) Input passed to the "IconURL" parameter in "InstallTrigger.install()" is not properly verified before being used. This can be exploited to execute arbitrary JavaScript code with escalated privileges via a specially crafted JavaScript URL.