[2374] in Release_7.7_team

home help back first fref pref prev next nref lref last post

Re: Netscape 4.73 security vulnerability

daemon@ATHENA.MIT.EDU (t. belton)
Wed Aug 2 12:46:54 2000

Date: Wed, 2 Aug 2000 12:43:24 -0400 (EDT)
From: "t. belton" <tbelton@MIT.EDU>
To: "Thomas Bushnell, BSG" <tb@mit.edu>
cc: release-team@mit.edu, infoagents@mit.edu
In-Reply-To: <u1hvgxm13t2.fsf@alice-whacker.mit.edu>
Message-ID: <Pine.GSO.4.21L.0008021243010.29218-100000@iphigenia.mit.edu>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

Already in progress for infoagents, but thanks.

On 31 Jul 2000, Thomas Bushnell, BSG wrote:

> 
> Netscape 4.73 has a serious security problem which has been widely
> announced to the world.  I believe it is incumbent on us to install
> and switch to Netscape 4.74 as soon as possible--no more than one week
> delay, in my opinion, maybe faster.
> 
> As it is described by Red Hat:
> 
> 
>       Netscape's processing of JPEG comments trusted the length parameter
>       for comment fields; by manipulating this value, it would be possible
>       to cause netscape to read in an excessive amount of data, overwriting
>       memory. Specially designed data could allow a remote site to execute
>       arbitrary code as the user of netscape.
> 
>       This vulnerability is fixed in Netscape 4.74. 
> 
> 
> Thomas
> 


home help back first fref pref prev next nref lref last post