Mozilla fixes Firefox URL passing flaw

Mozilla has released Firefox to fix two security vulnerabilities.

Of the two flaws, the more serious occurs where the browser fails to percent-encode spaces and double quotes in URLs passed to helper applications passed to helper applications. This allow malicious web pages to open programs with potentially dangerous command line parameters.

The other vulnerability is a privilege elevation bug involving extensions, which was accidentally introduced in Firefox

The URL protocol handling flaw is similar to the firefoxurl:// URL vulnerability, which was fixed with the release of Firefox This let an attacker user Internet Explorer to launch Firefox with malicious command line parameters. In the flaw fixed in Firefox, Firefox is used as the attack vector to start other applications with dangerous arguments. The exploit could be extended to execute any program in a known location, possibly passing dangerous command line parameters.

Firefox is available via the built-in update feature or from Detailed information can be found in the release notes. Equivalent updates to Thunderbird and SeaMonkey are expected soon.

Disclaimer: Some pages on this site may include an affiliate link. This does not effect our editorial in any way.

Todays Highlights
How to See Google Search History
how to download photos from google photos