Firefox 31 was released by Mozilla on Tuesday and fixes a total of 11 vulnerabilities affecting earlier versions.
Three of the flaws in the the popular Web browser have been rated critical, which indicates that they can be exploited to execute code and install software without requiring user interaction beyond normal browsing. One of them, a potentially exploitable crash when using the Cesium JavaScript library to generate WebGL content, was reported by developer Patrick Cozzi. A different exploitable crash, affecting DirectWrite when rendering MathML content with specific fonts, has been reported to Mozilla by community member James Kitchener.
Various memory safety hazards fixed in Firefox 31 are also considered critical.
“Mozilla developers and community identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code,” Mozilla said in its advisory.
Three of the five high-impact vulnerabilities addressed in the latest version of the Web browser are use-after-free issues that result in a potentially exploitable crash. The crashes occur when certificates are manipulated in a certain way in the trusted cache, when the FireOnStateChange event is triggered in some circumstances, and when control messages for Web Audio are ordered and processed incorrectly.
A different potentially exploitable crash occurs in the Skia library when scaling high quality images and the scaling operation takes too long. The last high-impact vulnerability is a buffer overflow during Web Audio buffering for playback, which can be exploited with specially crafted audio content. Atte Kettunen from OUSPG, Jethro Beekman of the University of California, Tyson Smith, Jesse Schwartzentruber and a Mozilla community member named John have been credited for finding the high-impact bugs.
The moderate-impact bugs have been described by Mozilla as “IFRAME sandbox same-origin access through redirect” and “certificate parsing broken by non-standard character encoding.” The flaws were reported by Mozilla developer Boris Zbarsky and Mozilla security researcher Christian Holler.
All of these vulnerabilities affect Thunderbird as well. Mozilla has addressed the security holes in the email client with the release of Thunderbird 31.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Zyxel Firewalls Hacked by Mirai Botnet
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
- Drop in Insider Breaches Drives Decline in Intrusions at OT Organizations
- Zero-Day Vulnerability Exploited to Hack Barracuda Email Security Gateway Appliances
- OAuth Vulnerabilities in Widely Used Expo Framework Allowed Account Takeovers
- New Honeywell OT Cybersecurity Solution Helps Identify Vulnerabilities, Threats
- Rheinmetall Says Military Business Not Impacted by Ransomware Attack
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
