On Friday, Mozilla issued another security fix for issues discovered after the release of Firefox 16.0.1, which if exploited, would allow Cross-Site Scripting (XSS) or code execution. The latest release is available now in the update channel and for direct download.
Friday’s release marks the third time this month that security issues needed to be addressed. It’s also the 14th critical fix released for version 16.
Version 16.0.2 patches the browser against XSS attacks that could target the LocationObject. Namely, according to the details released, “…the true value of window.location could be shadowed by user content through the use of the valueOf method, which can be combined with some plugins to perform a cross-site scripting (XSS) attack on users.”
Another issue centers on the CheckURL function, which if exploited could be used during an XSS attack or to execute malicious code. The third issue also addresses a location object problem, where the security wrapper could be bypassed.
Earlier this month, 24-hours after Firefox 16 was released, Mozilla pulled it in order to address security issues that were not detected in the final release checks.
As of now, version 16.0.2 is being reported as stable. Downloads are available online, but existing Firefox users should be upgraded after a restart of the browser. Additional information is available here.
Related: Total Recall – The Details Behind Firefox 16 Recall
More from Steve Ragan
- Anonymous Claims Attack on IP Surveillance Firm Brickcom, Leaks Customer Data
- Workers Don’t Trust Employers with Personal Data: Survey
- Root SSH Key Compromised in Emergency Alerting Systems
- Morningstar Data Breach Impacted 184,000 Clients
- Microsoft to Patch Seven Flaws in July’s Patch Tuesday
- OpenX Addresses New Security Flaws with Latest Update
- Ubisoft Breached: Users Urged to Change Passwords
- Anonymous Targets Anti-Anonymity B2B Firm Relead.com
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
