Friday, October 29, 2010

XULRunner: race condition Vulnerability

Users of XULRunner please be advised of a race condition vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
RHSA-2010:0809-01: [RHSA-2010:0809-01] xulrunner race condition
Description:

XULRunner provides the XUL Runtime environment for applications using the
Gecko layout engine.

A race condition flaw was found in the way XULRunner handled Document
Object Model (DOM) element properties. Malicious HTML content could cause
an application linked against XULRunner (such as Firefox) to crash or,
potentially, execute arbitrary code with the privileges of the user running
the application. (CVE-2010-3765)Read more at www.criticalwatch.com
 

No comments:

Post a Comment