LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 21st, 2014
Linux Security Week: April 7th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: netscape vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
Debian An updated netscape package now exists to fix several remote exploit vulnerabilities.
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------------
Debian Security Advisory                                 security@debian.org 
http://www.debian.org/security/                                Michael Stone
September 1, 2000
- ----------------------------------------------------------------------------

Package: netscape (communicator, navigator)
Vulnerability: remote exploit
Debian-specific: no

Existing Netscape Communicator/Navigator packages contain the following
vulnerabilities:

 1. Netscape Communicator JPEG-Comment Heap Overwrite Vulnerability
    - executes arbitrary code in the comment field of a JPEG image
    - Netscape Communicator/Navigator versions 4.0 through 4.73 are vulnerable
 2. Multiple Vendor Java Virtual Machine Listening Socket Vulnerability
 3. Netscape Communicator URL Read Vulnerability
    - items 2 and 3 together are known as the "Brown Orifice" vulnerability
    - can be exploited to expose the contents of your computer to anyone on the
      Internet, allowing to read files visible to the user running the browser
    - Netscape Communicator/Navigator versions 4.0 through 4.74 are vulnerable

Netscape Communicator/Navigator is not a part of the Debian distribution, but
packages are available for the convenience of our users. We recommend that
users who choose to run Netscape Communicator/Navigator upgrade to version
4.75. New packages are available in source form and for Intel ia32 machines
running Debian 2.2 (potato). Note that the new packages will not remove your
existing Communicator/Navigator packages; you should manually remove any older
installed versions of Communicator/Navigator. (More detailed instructions for
installing and removing these packages is available in the web version of this
report, at  http://www.debian.org/security/2000/20000901)

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

  Source archives:
     http://security.debian.org/dists/potato/updates/non-free/source/netscape4.75_4.75-1potato1.diff.gz
      MD5 checksum: 99ab453006b123ade6b62d508052e8aa
     http://security.debian.org/dists/potato/updates/non-free/source/netscape4.75_4.75-1potato1.dsc
      MD5 checksum: b6c8220d540580c62302e51bd310273c
     http://security.debian.org/dists/potato/updates/non-free/source/netscape4.75_4.75.orig.tar.gz
      MD5 checksum: 291d418188dd0d859c842b8e511f40dd
     http://security.debian.org/dists/potato/updates/non-free/source/netscape4.base_4.75-1.dsc
      MD5 checksum: 834ccd2acc61052bf9b01f58c5adb767
     http://security.debian.org/dists/potato/updates/non-free/source/netscape4.base_4.75-1.tar.gz
      MD5 checksum: c9f71e888d9ce42d7317a7a8255a25f4
  Intel ia32 architecture:
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/communicator-base-475_4.75-1potato1_i386.deb
      MD5 checksum: 401b63408d1477978fe16a855b9b2a14
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/communicator-nethelp-475_4.75-1potato1_all.deb
      MD5 checksum: 763d8c075f0200d77ce1ad91af3d4c27
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/communicator-smotif-475-libc5_4.75-1potato1_i386.deb
      MD5 checksum: d255e35d8365486b28a6e5c02bdf7e80
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/communicator-smotif-475_4.75-1potato1_i386.deb
      MD5 checksum: a8b595e4ba544861109e91cf2f494d67
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/communicator-spellchk-475_4.75-1potato1_all.deb
      MD5 checksum: 2c42207d48399b1d9ea757a1ee677414
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/communicator_4.75-1_i386.deb
      MD5 checksum: 3b67100464ed0aa6a22bef337c14798f
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/navigator-base-475_4.75-1potato1_i386.deb
      MD5 checksum: f4ed466d94b761b3a5f252c859c1c38d
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/navigator-nethelp-475_4.75-1potato1_all.deb
      MD5 checksum: 3e671e3bd853557df55915a395f57d39
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/navigator-smotif-475-libc5_4.75-1potato1_i386.deb
      MD5 checksum: d46984adbf2703f26a5bbd1cff912967
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/navigator-smotif-475_4.75-1potato1_i386.deb
      MD5 checksum: 3e7de9bb9c0c8c73519c3b7149de6af4
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/navigator_4.75-1_i386.deb
      MD5 checksum: a4f735e76fb26bc46a99edb557e41d43
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-base-4-libc5_4.75-1_i386.deb
      MD5 checksum: be2014f7b47913fc2d40dd3a2f7dc60f
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-base-475_4.75-1potato1_i386.deb
      MD5 checksum: 4cae30606eb234d79c0469ad3e430ece
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-base-4_4.75-1_i386.deb
      MD5 checksum: e594f5e58bfab22b5c4333d6e648b8bc
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-ja-resource-475_4.75-1potato1_all.deb
      MD5 checksum: 2f5aadfe24499b6ed79d7c1810aedb70
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-java-475_4.75-1potato1_all.deb
      MD5 checksum: 2b1d1abed84ac00eef02de530ad95028
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-ko-resource-475_4.75-1potato1_all.deb
      MD5 checksum: b2335dabae4430a69773ba22b3d5100c
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-smotif-475-libc5_4.75-1potato1_i386.deb
      MD5 checksum: 2397e4c0d8e556ea457b0095ad102d96
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-smotif-475_4.75-1potato1_i386.deb
      MD5 checksum: 45f1df641dc6869f880ee32abc1c8eb2
     http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-zh-resource-475_4.75-1potato1_all.deb
      MD5 checksum: 5cb68c9bf8a895488c4a75145c48c915


- ----------------------------------------------------------------------------
For apt-get: deb  http://security.debian.org/ stable/updates main
For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQCVAwUBObBSrQ0hVr09l8FJAQFv8AP/XBzoDlk+W+rA/Zg7SqAFSGXjDip0hFxb
cnIzJ4q0Bvi5zmFOIm+yT4lUBjBqdDaE8bwiTMWn0figbpxwsKoxUf4+EVjVRpXr
qLqL2VMgFLSLCgMud8UlmAvZGomYG8FT9cPmGHjGaVaH5/VAtiswCWXZxGvuKKeT
+9A4VcLIjic=
=2Ou9
-----END PGP SIGNATURE-----
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.