The issue was publicly disclosed by security researcher Gareth Heyes on Wednesday. Heyes published proof-of-concept code that, when loaded from an arbitrary Web page, could determine the user name of a user logged into Twitter.
Mozilla determined that the issue found by Heyes only affects Firefox 16.0 and addressed it in Firefox 16.0.1.
However, the new version of Firefox also fixes a separate vulnerability discovered by a Mozilla security researcher that can result in a similar behavior. In Firefox 15 and earlier versions this second security issue can also potentially lead to arbitrary code execution.
In addition, Firefox 16.0.1 fixes two memory corruption bugs in the browser engine that can result in crashes and can potentially be exploited to execute arbitrary code. One of these bugs only affects the Android version of Firefox when running inside custom Android firmware like CyanogenMod.
Thunderbird 16.0.1 and SeaMonkey 2.13.1 were also released on Thursday in order to address the same vulnerabilities that were patched in the desktop version of Firefox.
The following two tabs change content below.
Senior executive editor at EwtNet
A web developer, IT undergrad, terrible entrepreneur, internet freak and a man of a few other incongruous talents, Ebenezer has been writing on technology since 2012, and plans to do so until a few days before his ultimate fate: cryogenic preservation. If resurrected, he is likely to go back to writing on technology.
Latest posts by Ebenezer Obasi (see all)
- Install Windows 10/8/7 From USB Flash Drive with UEFI Support - January 31, 2019
- How to Use Google Docs Offline - December 22, 2018
- EaseUS Free Data Recovery Wizard Lets you get back lost files - August 27, 2017
- TAGS :