Last Updated on Monday, 29 October 2012 17:49 Published on Monday, 29 October 2012 17:49
On Friday, Mozilla issued another security fix for issues discovered after the release of Firefox 16.0.1, which if exploited, would allow Cross-Site Scripting (XSS) or code execution. The latest release is available now in the update channel and for direct download.
Friday’s release marks the third time this month that security issues needed to be addressed. It’s also the 14th critical fix released for version 16.
Version 16.0.2 patches the browser against XSS attacks that could target the LocationObject. Namely, according to the details released, “...the true value of window.location could be shadowed by user content through the use of the valueOf method, which can be combined with some plugins to perform a cross-site scripting (XSS) attack on users.”
Another issue centers on the CheckURL function, which if exploited could be used during an XSS attack or to execute malicious code. The third issue also addresses a location object problem, where the security wrapper could be bypassed.
Earlier this month, 24-hours after Firefox 16 was released, Mozilla pulled it in order to address security issues that were not detected in the final release checks.
As of now, version 16.0.2 is being reported as stable. Downloads are available online, but existing Firefox users should be upgraded after a restart of the browser. Additional information is available here. [securityweek]