[12277] in bugtraq
Netscape 4.x buffer overflow
daemon@ATHENA.MIT.EDU (Max Vision)
Tue Oct 19 15:44:41 1999
Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id: <Pine.BSO.4.10.9910181715160.30008-100000@www.whitehats.com>
Date: Mon, 18 Oct 1999 17:46:26 -0700
Reply-To: Max Vision <vision@WHITEHATS.COM>
From: Max Vision <vision@WHITEHATS.COM>
X-To: BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <38072A49.E13DE469@siac.com>
I have found a buffer overflow in Netscape Communicator probably affecting
all versions. The problem occurs when Communicator attempts to load any
dynamic font where the length field is shorter than the font data area. I
have tested this on 4.61 and 4.7 under Windows. Netscape has been
notified of the problem and expect a fix for 4.8.
As the problem manifests during the loading of a dynamic font, and portion
of the font data that exceeds the specified size of the font triggers the
problem. Thus, the potential for widespread DoS attacks via email. I
suspect, but have not pursued, the possibility of exploiting the overflow
to execute arbitrary code.
[ Note: I originally submitted this issue to bugtraq October 8th, but it
was not posted. The above two paragraphs are *exactly* the same as
another accepted post "Netscape 4.x buffer overflow" except I replaced
"key length" with "dynamic fonts" and it is equally valid. For more
information and a sample exploit see
http://www.whitehats.com/browsers/maxvisioncrash47/index.html ]
Max Vision
On Fri, 15 Oct 1999, Michael Breuer wrote:
> I have found a buffer overflow in Netscape Communicator probably
> affecting all versions. The problem occurs when Communicator attempts
> to validate any key where the key length is > 2k. I have tested this
> on 4.61 and 4.7, unix (Irix) and Windows. Netscape has been notified
> of the problem and expect a fix for 4.8.
>
> As the problem manifests during the check of the key, any portion of
> the key chain which has a key > 2k triggers the problem. Thus, the
> potential for widespread DoS attacks via email. I suspect, but have
> not pursued, the possibility of exploiting the overflow to execute
> arbitrary code. -- Michael Breuer mbreuer@siac.com
>