Security research firm
Secunia has found
a security flaw in the latest version of Firefox (2.0.0.4) that it labels
"highly critical." The flaw can reportedly be exploited by malicious users in
order to compromise a victim's machine. The problem is that Firefox registers
the "firefoxurl://" URI handler and allows invoking firefox with arbitrary
command line arguments. Using e.g. the "-chrome" parameter it is possible to
execute arbitrary Javascript in chrome context. This can be exploited to execute
arbitrary commands e.g. when a user visits a malicious web site using Microsoft
Internet Explorer. The vulnerability is confirmed in Firefox version 2.0.0.4 on
a fully patched Windows XP SP2. Other versions may also be affected.
Aside from simply avoiding malicious websites,
Secunia CTO Thomas Kristensen tells CNet that system administrators can get
around the hole by un-registering or removing the Firefox URI handler. Neither
Kristensen nor CNet provides instructions for that procedure, however.