Mozilla fixes 11 new flaws in Firefox, six critical
It also patches Firefox 2.0; just one more update coming for older browser
Yesterday's update patched virtually the same number of vulnerabilities as the last security update seven weeks ago.
Firefox 3.0.4, the fourth update since Mozilla launched the browser in June, fixes six flaws rated "critical," two "high," two "moderate," and one "low" in Mozilla's four-step scoring system. Most of the critical bugs could be used by hackers to introduce their own malicious code into a vulnerable system.
That vulnerability was judged moderate by Mozilla because of extenuating circumstances. "It requires an attacker to have malicious code saved locally, then have a user open a chrome: document or privileged about: URI, and then open the malicious file in the same privileged tab," Mozilla said in its advisory.
Mozilla also updated the nearly retired Firefox to 18.104.22.168, patching all but two of the same vulnerabilities fixed in 3.0.4 and several others for good measure. Of the dozen bugs, six were rated critical. The 22.214.171.124 update will be the next-to-the-last one for the older Firefox 2.0, which will be dropped from support next month.
Before that happens, Mozilla will make one last effort to convince Firefox 2.0 users to upgrade. In two to three weeks, users will again be prompted to upgrade in a repeat of an offer first extended in August. Mozilla has been very successful in convincing users to upgrade; as of the end of October, 73% of users were running the newer Firefox 3.0, reported Web metrics firm Net Applications.
At times, the gap between Firefox and Thunderbird patches has been more than a month. This time, however, Thunderbird should be updated soon; Version 126.96.36.199 entered beta testing yesterday.
Users can download the update for Windows, Mac OS X and Linux from the Mozilla site, call up their browser's built-in updater or wait for the automatic update notification, which typically appears within 48 hours.
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts