SEPTEMBER 21, 2005 (TECHWORLD.COM) - A serious security flaw surfaced yesterday that affects the Firefox Web browser and Linux but leaves Microsoft's Internet Explorer and Windows unscathed. The bug is in the Linux shell scripts that Firefox and the Mozilla browser suite use to parse Web addresses supplied via the command line or by external programs such as e-mail clients. Researcher Peter Zelezny discovered that commands included in the URL and enclosed in backticks (') were executed by the Linux or Unix shell. The flaw doesn't require Web interaction to be effective. If a user with affected versions of Firefox or Mozilla set as the default browser clicks on a maliciously crafted URL in an e-mail program, for example, malicious commands would be executed before the browser was launched. Security advisory firms Secunia and FrSIRT both gave the flaw their most severe ratings. Reproducible: Always Steps to Reproduce: 1. 2. 3.
Hate to say but this is a duplicate of bug #105396. Just because 1.0.7 isn't in the tree, doesn't mean that it's patched. The mozilla herd does a great job of releasing new version bumps that contain the fixes. As in this case where you should be using -r7.
Is that also corrected on mozilla-firefox-bin-1.0.6-r2???
(In reply to comment #2) > Is that also corrected on mozilla-firefox-bin-1.0.6-r2??? > -r7 fixes this vulnerability, but not the other more or less problematic issues wiith 1.0.7. *** This bug has been marked as a duplicate of 105396 ***