[11552] in bugtraq

home help back first fref pref prev next nref lref last post

Re: [Fwd: ISS Security Advisory: Buffer Overflow in Netscape

daemon@ATHENA.MIT.EDU (X-Force)
Sat Aug 28 11:38:32 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.3.95.990826145947.3080A-100000@arden.iss.net>
Date:         Thu, 26 Aug 1999 15:23:12 -0400
Reply-To: X-Force <xforce@ISS.NET>
From: X-Force <xforce@ISS.NET>
X-To:         BUGTRAQ <bugtraq@securityfocus.com>
To: BUGTRAQ@SECURITYFOCUS.COM

Comments within.

Erik Fichtner wrote:

> Is this vulnerability in other versions of Enterprise server?

  We tested the vulnerability against the current releases of Enterprise
  and Fasttrack.  Earlier versions may be vulnerable, but they were not
  tested against.

> Does it exist on all platforms?

  No, our advisory effects only NT, Solaris was tested against and found
  not vulnerable.  AIX and other platforms were not tested against and
  these platforms potentially could be vulnerable.

> Is this an issue only with the SSL server (SSL Handshake? huh? what does
> THAT have to do with a GET request?) or does this affect the entire
> server?

  Netscape decided to combine the GET overflow patch in with an SSL
  problem.  This vulnerability affects the entire server.  Netscapes
  handles their patch bundling, we have no involvment with that.

> Are patches available for previous versions of Enterprise server?

  Not that we know of, If previous versions are found to be vulnerable
  Netscape should be contacted and will issue a patch at that time.


----
X-Force
Internet Security Systems, Inc.
(678) 443-6000 / http://xforce.iss.net/
Adaptive Network Security for the Enterprise

home help back first fref pref prev next nref lref last post