Mozilla can allow persisted XUL attributes to associate with the wrong URL. This may allow a remote attacker to execute arbitrary code.
XUL is an XML-based user interface language, which is used by Mozilla.
By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an HTML email attachment), an attacker may be able to execute arbitrary code with the privileges of the user.
Apply an update
Thanks to Mozilla Foundation Security Advisory for reporting this vulnerability, who in turn credit Jonas Sicking.
This document was written by Will Dormann.
|Date First Published:||2006-06-02|
|Date Last Updated:||2007-02-09 14:36 UTC|