Dec 9, 2010 18:39 GMT  ·  By

Mozilla has released versions 3.6.13 and 3.5.16 of its popular Firefox browser to address critical vulnerabilities that could be exploited to execute arbitrary code.

There are a total of eleven vulnerabilities affecting the browser’s both 3.6.x and 3.5.x branches and nine of them are rated as having a critical impact.

One flaw involves a circumvention method for a previously patched remote code execution vulnerability (CVE-2010-0179).

Another one is an integer overflow bug in the NewIdArray function, which could be exploited to corrupt memory and execute unauthorized code.

An use-after-free error has been identified in the nsDOMAttribute MutationObserver node, allowing for attackers to call memory under their control.

A flaw involving a bypass of Java security policy has also been patched. It could have been exploited by loading a Java LiveConnect script to create a plugin object that could read files, launch processes, and create network connections.

The OTS font sanitizing library has been implemented to prevent downloadable font files from exploiting vulnerabilities in the operating system's font parsing code.

A buffer overflow vulnerability stemming from improper handling of HTML tags inside a XUL tree has been discovered and fixed and so was a chrome privilege escalation with the window.open function.

A separate buffer overflow flaw that could have been exploited by passing a very long string to document.write(), has also been patched.

Finally, a cumulative critical advisory covers three memory safety issues in the Gecko brower engine, one affecting Firefox 3.5 only, one 3.6, and one both of them.

A medium-risk location bar spoofing issue has also been addressed, along with a low-impact cross-site scripting weakness in multiple character encodings.

The latest version of Mozilla Firefox for Windows can be downloaded here.

The latest version of Mozilla Firefox for Mac can be downloaded here.

The latest version of Mozilla Firefox for Linux can be downloaded here.