Have you ordered your copy of Dynaverse.Net Updated OP Strategy Guide? Order here : LULU.COM
0 Members and 1 Guest are viewing this topic.
A proof of concept exploit found here uses IE to hand off maliciously-scripted code to a Firefox handler known as "firefoxurl." Handlers, which also include strings such as "ftp" and "aim," are found in the address bar and in many cases can be used to get Firefox to carry out certain actions.
meh, I use Safari and Opera.... on Macintosh
Fixed in Firefox 2.0.0.5MFSA 2007-25 XPCNativeWrapper pollutionMFSA 2007-24 Unauthorized access to wyciwyg:// documentsMFSA 2007-23 Remote code execution by launching Firefox from Internet ExplorerMFSA 2007-22 File type confusion due to %00 in nameMFSA 2007-21 Privilege escalation using an event handler attached to an element not in the documentMFSA 2007-20 Frame spoofing while window is loadingMFSA 2007-19 XSS using addEventListener and setTimeoutMFSA 2007-18 Crashes with e
MFSA 2007-23 Remote code execution by launching Firefox from Internet ExplorerMFSA 2007-18 Crashes with evidence of memory corruption
I wonder how long it will take MS to come up with a fix on their end. Oh, wait... I forgot, it is never MS's fault.