[2374] in Release_7.7_team
Re: Netscape 4.73 security vulnerability
daemon@ATHENA.MIT.EDU (t. belton)
Wed Aug 2 12:46:54 2000
Date: Wed, 2 Aug 2000 12:43:24 -0400 (EDT)
From: "t. belton" <tbelton@MIT.EDU>
To: "Thomas Bushnell, BSG" <tb@mit.edu>
cc: release-team@mit.edu, infoagents@mit.edu
In-Reply-To: <u1hvgxm13t2.fsf@alice-whacker.mit.edu>
Message-ID: <Pine.GSO.4.21L.0008021243010.29218-100000@iphigenia.mit.edu>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Already in progress for infoagents, but thanks.
On 31 Jul 2000, Thomas Bushnell, BSG wrote:
>
> Netscape 4.73 has a serious security problem which has been widely
> announced to the world. I believe it is incumbent on us to install
> and switch to Netscape 4.74 as soon as possible--no more than one week
> delay, in my opinion, maybe faster.
>
> As it is described by Red Hat:
>
>
> Netscape's processing of JPEG comments trusted the length parameter
> for comment fields; by manipulating this value, it would be possible
> to cause netscape to read in an excessive amount of data, overwriting
> memory. Specially designed data could allow a remote site to execute
> arbitrary code as the user of netscape.
>
> This vulnerability is fixed in Netscape 4.74.
>
>
> Thomas
>