Mozilla Firefox Tag Order Vulnerability A particular sequence of HTML tags that reliably crash Mozilla clients was reported by an anonymous researcher via TippingPoint and the Zero Day Initiative. The crash is due to memory corruption that can be exploited to run arbitary code. Mozilla mail clients will crash on the tag sequence, but without the ability to run scripts to fill memory with the attack code it may not be possible for an attacker to exploit this crash. Workaround Upgrade to a fixed version. References [1]ZDI-06-008 [2]https://bugzilla.mozilla.org/show_bug.cgi?id=320182 [3]https://bugzilla.mozilla.org/show_bug.cgi?id=269095 CVE-2006-0749
Lifting embargo
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2006-0330.html