Mozilla Firefox Tag Order Vulnerability A particular sequence of HTML tags that reliably crash Mozilla clients was reported by an anonymous researcher via TippingPoint and the Zero Day Initiative. The crash is due to memory corruption that can be exploited to run arbitary code. Mozilla mail clients will crash on the tag sequence, but without the ability to run scripts to fill memory with the attack code it may not be possible for an attacker to exploit this crash. Workaround Upgrade to a fixed version. References [1]ZDI-06-008 [2]https://bugzilla.mozilla.org/show_bug.cgi?id=320182 [3]https://bugzilla.mozilla.org/show_bug.cgi?id=269095 CVE-2006-0749 This issue also affects FC4
The packages that fix this have been released in FEDORA-2006-410 and FEDORA-2006-411 (firefox-1.0.8-1.1.fc4 and firefox-1.5.0.2-1.1.fc5, respectively), no?
These issues have been resolved in FEDORA-2006-411 for FC5 and FEDORA-2006-410 for FC4