Bug 20462 - Netscape 4.75 buffer overflow
Summary: Netscape 4.75 buffer overflow
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: netscape   
(Show other bugs)
Version: 7.0
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Bill Nottingham
QA Contact: David Lawrence
Keywords: Security
Depends On:
TreeView+ depends on / blocked
Reported: 2000-11-07 12:59 UTC by Daniel Roesen
Modified: 2014-03-17 02:17 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2000-11-10 17:06:18 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

Description Daniel Roesen 2000-11-07 12:59:22 UTC
From a recent BugTraq advisory
(Message-ID:  <20001106234541.11EB637B65F@hub.freebsd.org>)

---- BEGIN CITE ----
Versions of netscape prior to 4.76 allow a client-side exploit through
a buffer overflow in html code. A malicious website operator can cause
arbitrary code to be executed by the user running the netscape client.
---- END CITE ----

Comment 1 Bill Nottingham 2000-11-07 17:42:08 UTC
I don't see any details of this in the release notes for 4.76. Do
you have a pointer to the original vulnerability report?g

Comment 3 Daniel Roesen 2000-11-07 18:47:15 UTC
if you mean a report before FreeBSD's advisory: I'm not aware of any.

Comment 4 Bill Nottingham 2000-11-07 20:41:48 UTC
Yeah, that's what I meant; I was surprised that the FreeBSD advisory
came out of the blue with no word from Netscape, or even the original
credited vulnerability discoverer.

Comment 5 Daniel Roesen 2000-11-10 17:06:15 UTC
any news yet?

Comment 6 Bill Nottingham 2000-11-19 05:56:32 UTC
4.76 errata packages were released.

Note You need to log in before you can comment on or make changes to this bug.