Note: This page is part of the archive.

This document is part of the US-CERT website archive. These documents are no longer updated and may contain outdated information. Links may also no longer function. Please contact if you have any questions about the US-CERT website archive.

Alert (TA07-199A)

Mozilla Updates for Multiple Vulnerabilities

Systems Affected

  • Mozilla Firefox
  • Mozilla Thunderbird

Other products based on Mozilla components may also be affected.


The Mozilla web browser and derived products contain several vulnerabilities, the most severe of which could allow a remote attacker to execute arbitrary code on an affected system.


Mozilla has released new versions of Firefox and Thunderbird to address several vulnerabilities. Further details about these vulnerabilities are available from Mozilla and the Vulnerability Notes Database. An attacker could exploit these vulnerabilities by convincing a user to view a specially-crafted HTML document, such as a web page or an HTML email message.


While the impacts of the individual vulnerabilities vary, the most severe could allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. An attacker may also be able to cause a denial of service or obtain private information.



These vulnerabilities are addressed in Mozilla Firefox and Thunderbird

Thunderbird was made available on July 19, 2007 and can be downloaded from the Mozilla Thunderbird download page.

Disable JavaScript

Some of these vulnerabilities can be mitigated by disabling JavaScript or using the NoScript extension. For more information about configuring Firefox, please see the Securing Your Web Browser document. Thunderbird disables JavaScript by default.


Revision History

  • July 18, 2007: Initial release
    July 19, 2007: Updated solutions section
    July 19, 2007: Fixed feedback link
    July 20, 2007: Added Thunderbird link

This product is provided subject to this Notification and this Privacy & Use policy.

Please share your thoughts.

We recently updated our anonymous product survey; we'd welcome your feedback.