The user has already lost. Game over.
An attacker can exploit the ability to modify the user's configuration in many different ways. E.g. redirect the browser to a proxy under the attacker's control, make Mozilla use a trojanized Chrome or a trojanized Java plugin, etc.
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html