As it turns out, there were some flaws in Mozilla's software after all.
The open source company today issued a series of patches for vulnerabilities exposed recently in Firefox, Thunderbird, and SeaMonkey, and recommended that users patch their systems immediately.
The patches come on the heels of a scare over a "zero-day" vulnerability in Firefox that was alleged by a hacker at the ToorCon conference earlier this week. In the end, the scare was overblown -- the hacker later conceded that the vulnerability only allows users to crash the browser, not control it. (See Zero-Day: Won't Go Away.)
The new vulnerabilities are very real, experts say. Two researchers -- Fernando Ribeiro and Priit Laes -- separately found errors that could lead to denial of service attacks, and possibly remote code execution, in Mozilla software.
Aside from the named discoveries, Mozilla reported "multiple unspecified vulnerabilities" in Firefox, Thunderbird, and SeaMonkey that could allow an attacker to cause a denial of service, corrupt memory, "and possibly execute arbitrary code."
Mozilla users can eliminate the vulnerabilities by installing patches and updates, the vendor said.
Tim Wilson, Site Editor, Dark Reading