Users should update their browsers to avoid unfortunate incidents

Apr 25, 2012 11:05 GMT  ·  By

With the release of Firefox 12, Mozilla not only introduced the silent update feature, but also addressed a number of 14 security holes that exposed the web browser’s customers to malicious operations.

Seven of the vulnerabilities that affected the previous versions of Firefox were considered to be critical. If exploited, they could have allowed an attacker to execute his own code and even install some nasty pieces of software, without any user interaction being required.

These flaws refer to a potential memory corruption when fonts were rendered with cairo-dwrite, a heap corruption in gfxImageSurface, a use-after-free issue in IDBKeyRange, an off-by-one error in the OpenType Sanitizer, and multiple memory safety hazards.

The high severity weaknesses include a site identity spoofing problem when RSS and Atom feeds are loaded, and a couple of other flaws that might lead to cross-site scripting (XSS).

Users are advised to update to Firefox 12 to ensure that they can benefit from a safe browsing experience.

Mozilla for Windows is available for download here Mozilla for Mac is available for download here Mozilla for Linux is available for download here