Mozilla has published a security advisory to address a vulnerability found in Firefox. This vulnerability is caused by use-after-free error. A remote attacker could entice a user to open a web page with specially crafted content to exploit the vulnerability.
Reports indicate that the vulnerability is being actively exploited in the wild.
A successful attack could lead to arbitrary code execution on an affected system.
Mozilla has released new versions of the product to address the issues and they can be downloaded at the following URLs:
Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://www.mozilla.org/security/advisories/
https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox/
https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/
https://www.mozilla.org/en-US/security/advisories/mfsa2016-92/
https://www.hkcert.org/my_url/en/alert/16120101
https://www.us-cert.gov/ncas/current-activity/2016/11/30/Mozilla-Releases-Security-Updates
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079