I managed to find the source to firefox-1.5.dfsg+1.5.0.8 on a mirror (http://mirror.xmu.edu.cn/archive.ubuntu.com/ubuntu/pool/main/f/firefox/; it's already expired out of security.ubuntu.com and archive.ubuntu.com). Diff between firefox-1.5.dfsg+1.5.0.8 and firefox-1.5.dfsg+1.5.0.9 reveals that a guard on userField being non-null was removed between those two versions, viz: -=- cut here -=- @@ -941,20 +945,20 @@ } if (firstMatch && !attachedToInput) { - nsAutoString buffer; - - if (userField) { + AttachToInput(userField); + + if (prefillForm) { + nsAutoString buffer; if (NS_FAILED(DecryptData(firstMatch->userValue, buffer))) goto done; -=- cut here -=- (Full diff of that file below.) So since it appears to be fatal to call AttachToInput(NULL), it appears that the function has been "deliberately" changed to cause Firefox to crash when faced with a presaved form which has no username field. This seems to be undesirable. At very worst it should refuse to fill in the form and continue running; ideally it would continue the previous Firefox behaviour and fill in the form without fuss. There's nothing in the comments or changelog to explain why the guard on userField being non-null was removed. The entire changelog for .8 to .9 is: -=- cut here -=- firefox (1.5.dfsg+1.5.0.9-0ubuntu0.6.06) dapper-security; urgency=low * New upstream security update: - CVE-2006-6504, MFSA 2006-73: SVG Processing Remote Code Execution. - CVE-2006-6503, MFSA 2006-72: XSS by setting img.src to javascript: URI. - CVE-2006-6502, MFSA 2006-71: LiveConnect crash finalizing JS objects. - CVE-2006-6501, MFSA 2006-70: Privilege escallation using watch point. - CVE-2006-6497, CVE-2006-6498, CVE-2006-6499, MFSA 2006-68: Crashes with evidence of memory corruption. -- Kees Cook