Mozilla Firefox Multiple Memory Corruption Vulnerabilities Aug-09 (Win)

Summary
This host is installed with Mozilla Firefox and is prone to multiple Memory Corruption vulnerabilities.
Impact
Successful exploitation will let attackers to execute arbitrary code, phishing attack, and can cause Denial of Service. Impact Level: System/Application
Solution
Upgrade to Firefox version 3.0.13/3.5.2 http://www.mozilla.com/en-US/firefox/all.html
Insight
Multiple memory corruption are due to: - Error in 'js_watch_set()' function in js/src/jsdbgapi.cpp in the JavaScript engine which can be exploited via a crafted '.js' file. - Error in 'libvorbis()' which is used in the application can be exploited via a crafted '.ogg' file. - Error in 'TraceRecorder::snapshot()' function in js/src/jstracer.cpp and other unspecified vectors. - Error in 'window.open()' which fails to sanitise the invalid character in the crafted URL. This allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.
Affected
Firefox version before 3.0.13 or 3.5 before 3.5.2 on Windows.
References