| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Mozilla FireFox Vulnerability |
The following is from the F-Prot website (FRISK software) at www.f-prot.com on the Internet. While Microsoft cancelled its scheduled release of monthly security updates on 13 September 2005, a serious buffer overflow vulnerability has been discovered in the Mozilla and Firefox browsers. This vulnerability involves the browser's handling of International Domain Names (or IDNs) and could potentially allow an attacker to run malicious code on an affected computer by planting such code on a website. Mozilla has released a patch against this vulnerability that disables the browser's IDN support as well as instructions on how to disable this manually. We recommend that all Mozilla and Firefox users download and apply the patch as soon as possible or follow the instructions on Mozilla's website. Mozilla is reportedly working on a more permanent solution to be included in future versions. Firefox has been growing fast in popularity since its official release in November 2004. --- SBBSecho 2.11-Win32* Origin: The Thunderbolt BBS 501-223-2541 tbolt.synchro.net (1:382/33) SEEN-BY: 633/267 270 5030/786 @PATH: 382/33 61 140/1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.