Firefox 16 patches 24 vulnerabilities
Eleven of the 14 security advisories accompanying Firefox 16 were rated as critical
IDG News Service - Mozilla Firefox 16 was released on Tuesday and addresses numerous security vulnerabilities, many of which are rated as critical.
The new version of Firefox was accompanied by 14 security advisories, 11 rated as critical, that patched a total of 24 vulnerabilities.
Many of the critical security holes that were addressed in Firefox 16 could have allowed attackers to execute arbitrary code on the system, bypass security checks that prevent Web pages from interacting with the browser in unauthorized ways, perform spoofing or clickjacking attacks, and, in the case of the Android version of Firefox, allow a malicious Web page opened in reader mode to gain the browser's permissions on the OS.
The other three security advisories were rated as medium severity and covered vulnerabilities that could have allowed attackers to execute cross-site scripting (XSS) or script injection attacks.
Most of the vulnerabilities fixed in Firefox 16, were also addressed in Mozilla Thunderbird 16 and Mozilla SeaMonkey 2.13 which were also released on Tuesday. Some of the fixes have also been backported to the Firefox and Thunderbird ESR (Extended Support Release) versions that are used in enterprise environments.
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!