Firefox 1.5 Exploit Code in the Wild

Proof of concept exploit code for an unpatched security flaw in the newly released Firefox 1.5 was publicly posted Wednesday by Packetstorm Security. The problem involves Firefox's history database, which cannot handle extremely long page topics. A malicious Web page could cause a buffer overflow that crashes Firefox each time it is started.

The only way to fix the problem is to manually delete the history.dat file before Firefox is started. "This vulnerability has been tested and does work, and no known patches are available at this time," wrote John Bambenek on the SANS Internet Storm Center. "Presumably, if the topic was more tightly crafted than in the proof-of-concept code, a more malicious attack could be crafted that would install malware on the machine."

54 Responses to Firefox 1.5 Exploit Code in the Wild

Why Trust Us

At BetaNews.com, we don't just report the news: We live it. Our team of tech-savvy writers is dedicated to bringing you breaking news, in-depth analysis, and trustworthy reviews across the digital landscape.

betanews logo

We don't just report the news: We live it. Our team of tech-savvy writers is dedicated to bringing you breaking news, in-depth analysis, and trustworthy reviews across the digital landscape.

x logo facebook logo linkedin logo rss feed logo

Categories

AI Technology Software Hardware Security

Quick Links

About Us Privacy Policy Cookie Policy Sitemap

© 1998-2025 BetaNews, Inc. All Rights Reserved.