A heap-based buffer overflow in Netscape and Mozilla allows remote attackers to
execute arbitrary code via a jar: URL that references a malformed .jar file,
which overflows a buffer during decompression.
Fixed (along with other issues) in Mozilla 1.0.2
Errata RHSA-2003:163 in progress
An errata has been issued which should help the problem described in this bug report.
This report is therefore being closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files, please follow the link below. You may reopen
this bug report if the solution does not work for you.