![]() |
Firefox 1.5 may encounter buffer overflow errors |
The open-source software organization has recently released a security advisory acknowledging that a bug in the latest browser version could lead to buffer overflow issues.
However, they dismissed claims that this problem would cause lasting damage to the application if a denial-of-service attack were to occur.
The exploit code for the vulnerability in Firefox 1.5 was published on December 6, concerning a flaw in the history.dat file (which contains information about all the websites a user has visited). When this file exceeds 10.5 MB, the system may freeze and require significant time to clear the history buffer. According to Mozilla, to resolve the issue, users must delete all the content stored in History.
Mike Schroefper, the Deputy Technical Director at Mozilla, stated last week that he did not recognize this as a security vulnerability and asserted that Firefox 1.5 is very secure. The organization also mentioned that they had not received any feedback from customers regarding this issue.