Red Hat Bugzilla – Bug 188788
Last modified: 2007-11-30 17:11:30 EST
shutdown discovered it was possible to use the Object.watch() method to
access an internal function object (the "clone parent") which could then be
used to install malware such as password sniffers or viruses.
In pre-release versions of Firefox 1.5 the same technique could be applied
to the Array generic methods introduced in that release.
This issue also affects FC4
This bug was fixed for FC4 in Fedora Update FEDORA-2006-488
This bug was fixed for FC5 in Fedora Update FEDORA-2006-487