A new proof-of-concept code is circulating for a Firefox vulnerability that was fixed in Mozilla's security update that was released last week.
The U.S. Computer Emergency Response Team (CERT) issued a warning on Wednesday that a proof-of-concept code is circulating in the wild that could be vulnerability in Mozilla's Firefox browser.
The memory corruption vulnerability in Mozilla's flagship, open-source browser exists due to a flaw in the way Firefox handles freed data structures modified in the onUnload event handler, according to a U.S.-CERT advisory. That flaw can cause a memory corruption error.
Mozilla's security update, which was released last week, does fix the memory corruption issue, though the company had not made that public initially.
"The Firefox 220.127.116.11 update includes fixes for the bugs that researcher Michal Zalewski reported last week, including the hostname vulnerability, cookie issue and memory corruption issue," wrote Window Snyder, Mozilla's chief security officer, in an e-mail to InformationWeek. "Due to the security fixes, we strongly recommend that all Firefox users upgrade to this latest release." The upgrade is available at this Web site.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.