Interesting, thanks.
FWIW, that page contains many webbugs.
http://xforce.iss.net/xforce/alerts/id/191
Affected Products:
Firefox - all versions prior to 1.0.2
Mozilla web browser - all versions prior to 1.7.6
Mozilla Thunderbird Mail - all versions prior to 1.0.2
Note: Additional versions may be affected, please contact your
vendor for confirmation.
Description:
Graphic Interchange Format (GIF) is a common and established image
standard. This image format is widely supported in applications that
view images, including web browsers and email clients developed by
the Mozilla Foundation.
Mozilla Foundation software makes use of a common image library to
render GIF images. This library contains a buffer overflow vulnerability
when processing a Netscape-specific extension block in GIF images.
Exploitation of this buffer overflow can lead to remote compromise of
affected machines with minimal user-interaction.
In order to exploit this vulnerability, an attacker would be required
to induce the victim to view a web page or email message containing a
maliciously-crafted GIF image.
http://www.securityfocus.com/advisories/8275
A buffer overflow bug was found in the way Firefox processes GIF images.
It is possible for an attacker to create a specially crafted GIF image,
which when viewed by a victim will execute arbitrary code as the victim.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2005-0399 to this issue.
A bug was found in the way Firefox processes XUL content. If a malicious
web page can trick a user into dragging an object, it is possible to
load malicious XUL content. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2005-0401 to this issue.
A bug was found in the way Firefox bookmarks content to the sidebar. If
a user can be tricked into bookmarking a malicious web page into the
sidebar panel, that page could execute arbitrary programs. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CAN-2005-0402 to this issue.