Mozilla closes security loophole


Mozilla closes security loophole

The Mozilla Foundation has urged users of its open-source Mozilla Application Suite, Firefox browser and Thunderbird e-mail client to download a small patch to close off a security vulnerability.

The patch downloads a configuration change which disables the use of the :shell external protocol handler for running external programs by clicking on a hyperlink.

Mozilla said that the security handling of this command might allow attackers to run arbitrary programs on Windows systems, although there were no problems for Mozilla users running other operating systems such as MacOS, Linux and other Unix variants.

The vulnerability affects Mozilla version 1.7.0 and earlier, Firefox 0.9.1 and earlier, and Thunderbird 0.7.1 and earlier.

Full new versions of the free products are also available from the site.

David Legard writes for IDG News Service

Email Alerts

Register now to receive IT-related news, guides and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

COMMENTS powered by Disqus  //  Commenting policy