TIP: Click on subject to list as thread! ANSI
echo: dirty_dozen
to: All
from: Daryl Stout
date: 2005-09-13 15:12:06
subject: Mozilla FireFox Vulnerability

The following is from the F-Prot website (FRISK software) at
www.f-prot.com on the Internet.

  While Microsoft cancelled its scheduled release of monthly security
updates on 13 September 2005, a serious buffer overflow vulnerability
has been discovered in the Mozilla and Firefox browsers. This
vulnerability involves the browser's handling of International Domain
Names (or IDNs) and could potentially allow an attacker to run malicious
code on an affected computer by planting such code on a website.

  Mozilla has released a patch against this vulnerability that disables
the browser's IDN support as well as instructions on how to disable this
manually.

  We recommend that all Mozilla and Firefox users download and apply the
patch as soon as possible or follow the instructions on Mozilla's website.
Mozilla is reportedly working on a more permanent solution to be included
in future versions.

  Firefox has been growing fast in popularity since its official release
in November 2004.

--- SBBSecho 2.11-Win32
* Origin: The Thunderbolt BBS 501-223-2541 tbolt.synchro.net (1:382/33)
SEEN-BY: 633/267 270
@PATH: 382/33 61 140/1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.