Mozilla has patched a pair of nasty flaws in its Firefox browser, two weeks after security researchers first started posting code that showed how the flaws could be exploited in attacks.
The 220.127.116.11 version of Firefox, released on 30 July, fixes two related flaws in the URL protocol handler component of Firefox, which is used to launch programs when a user clicks on certain specially crafted Web links.
Mozilla rates these problems critical, meaning they are a serious security risk. But they have also proven to be an embarrassment for the open-source project.
Earlier in the month security researcher Thor Larholm showed how to exploit this type of problem in order to make Internet Explorer and Firefox jointly launch software on a user's machine without authorization. To make the attack work, IE would load malformed data from a Web site, and would then send it to Firefox, which would launch the unauthorized software
Microsoft and Mozilla disagreed about who was to blame, however, with Mozilla initially saying that the attack wouldn't work on Firefox alone.
But last week, Mozilla's security chief Window Snyder admitted that her team was wrong. "We thought this was just a problem with IE. It turns out, it is a problem with Firefox as well," she said in a blog posting. "We should have caught this scenario."
The URL protocol handler flaw will also be patched in Thunderbird 18.104.22.168, Thunderbird 22.214.171.124 and SeaMonkey 1.1.4, Mozilla said.
The 126.96.36.199 Firefox release also fixes a third security flaw, that Mozilla considers to be less-critical than the URL protocol handler bugs.