Mozilla Firefox Buffer Overflow Vulnerability - July09 (Linux)

Summary
The host is installed with Mozilla Firefox browser and is prone to Buffer Overflow vulnerability.
Impact
Successful attacks will let attackers to can cause Denial of Service to the legitimate user. Impact Level: Application
Solution
Upgrade to Firefox version 3.6.3 or later, For updates refer to http://www.mozilla.com/en-US/firefox/upgrade.html
Insight
- A NULL pointer dereference error exists due an unspecified vectors, related to a 'flash bug.' which can cause application crash. - Stack-based buffer overflow error is caused by sending an overly long string argument to the 'document.write' method.
Affected
Firefox version 3.5.1 and prior on Linux
References