LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 7th, 2014
Linux Advisory Watch: April 4th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Redhat: 'netscape' buffer overflow Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
RedHat Linux New Netscape packages are available that fix a buffer overflowin parsing HTML.

---------------------------------------------------------------------
                   Red Hat, Inc. Security Advisory

Synopsis:          New Netscape packages available
Advisory ID:       RHSA-2000:109-05
Issue date:        2000-11-17
Updated on:        2000-11-27
Product:           Red Hat Linux
Keywords:          netscape HTML buffer overflow
Cross references:  N/A
---------------------------------------------------------------------

1. Topic:

New Netscape packages are available that fix a buffer overflow
in parsing HTML.

It is recommended that all Netscape users update to the fixed
packages.

2000-11-27: Added packages for Red Hat Linux 7 for Alpha

2. Relevant releases/architectures:

Red Hat Linux 6.0 - i386, alpha, sparc
Red Hat Linux 6.1 - i386, alpha, sparc
Red Hat Linux 6.2 - i386, alpha, sparc
Red Hat Linux 7.0 - i386, alpha

3. Problem description:

A buffer overflow exists in Netscape's HTML parsing code. By
using specially designed code, a remote website could cause
arbitrary code to be run on the local machine.

4. Solution:

For each RPM for your particular architecture, run:

rpm -Fvh [filename]

where filename is the name of the RPM.

5. Bug IDs fixed  (http://bugzilla.Red Hat.com/bugzilla for more info):

20415 - Netscape segfault - cured in 4.76
20462 - Netscape 4.75 buffer overflow


6. RPMs required:

Red Hat Linux 6.0:

i386: 
ftp://updates.Red Hat.com/6.0/i386/netscape-common-4.76-0.6.2.i386.rpm 
ftp://updates.Red Hat.com/6.0/i386/netscape-communicator-4.76-0.6.2.i386.rpm 
ftp://updates.Red Hat.com/6.0/i386/netscape-navigator-4.76-0.6.2.i386.rpm

sources: 
ftp://updates.Red Hat.com/6.0/SRPMS/netscape-4.76-0.6.2.src.rpm

Red Hat Linux 6.1:

i386: 
ftp://updates.Red Hat.com/6.1/i386/netscape-common-4.76-0.6.2.i386.rpm 
ftp://updates.Red Hat.com/6.1/i386/netscape-communicator-4.76-0.6.2.i386.rpm 
ftp://updates.Red Hat.com/6.1/i386/netscape-navigator-4.76-0.6.2.i386.rpm

sources: 
ftp://updates.Red Hat.com/6.1/SRPMS/netscape-4.76-0.6.2.src.rpm

Red Hat Linux 6.2:

alpha: 
ftp://updates.Red Hat.com/6.2/alpha/netscape-common-4.76-0.6.2.alpha.rpm 
ftp://updates.Red Hat.com/6.2/alpha/netscape-communicator-4.76-0.6.2.alpha.rpm 
ftp://updates.Red Hat.com/6.2/alpha/netscape-navigator-4.76-0.6.2.alpha.rpm

i386: 
ftp://updates.Red Hat.com/6.2/i386/netscape-common-4.76-0.6.2.i386.rpm 
ftp://updates.Red Hat.com/6.2/i386/netscape-communicator-4.76-0.6.2.i386.rpm 
ftp://updates.Red Hat.com/6.2/i386/netscape-navigator-4.76-0.6.2.i386.rpm

sources: 
ftp://updates.Red Hat.com/6.2/SRPMS/netscape-alpha-4.76-0.6.2.src.rpm 
ftp://updates.Red Hat.com/6.2/SRPMS/netscape-4.76-0.6.2.src.rpm

Red Hat Linux 7.0:

alpha: 
ftp://updates.Red Hat.com/7.0/alpha/netscape-common-4.76-1.alpha.rpm 
ftp://updates.Red Hat.com/7.0/alpha/netscape-communicator-4.76-1.alpha.rpm 
ftp://updates.Red Hat.com/7.0/alpha/netscape-navigator-4.76-1.alpha.rpm

i386: 
ftp://updates.Red Hat.com/7.0/i386/netscape-common-4.76-1.i386.rpm 
ftp://updates.Red Hat.com/7.0/i386/netscape-communicator-4.76-1.i386.rpm 
ftp://updates.Red Hat.com/7.0/i386/netscape-navigator-4.76-1.i386.rpm

sources: 
ftp://updates.Red Hat.com/7.0/SRPMS/netscape-alpha-4.76-1.src.rpm 
ftp://updates.Red Hat.com/7.0/SRPMS/netscape-4.76-1.src.rpm

7. Verification:

MD5 sum                           Package Name
--------------------------------------------------------------------------
70e2a3b0e97bd39cf5041ed4abacda98  6.0/SRPMS/netscape-4.76-0.6.2.src.rpm
b4a875d94e0947b16b9a973d23f6222b  6.0/i386/netscape-common-4.76-0.6.2.i386.rpm
fcde6218d7de0e9e009892c57e7f88ca  6.0/i386/netscape-communicator-4.76-0.6.2.i386.rpm
670b08cbad1097f4ca923071c202b5dd  6.0/i386/netscape-navigator-4.76-0.6.2.i386.rpm
70e2a3b0e97bd39cf5041ed4abacda98  6.1/SRPMS/netscape-4.76-0.6.2.src.rpm
b4a875d94e0947b16b9a973d23f6222b  6.1/i386/netscape-common-4.76-0.6.2.i386.rpm
fcde6218d7de0e9e009892c57e7f88ca  6.1/i386/netscape-communicator-4.76-0.6.2.i386.rpm
670b08cbad1097f4ca923071c202b5dd  6.1/i386/netscape-navigator-4.76-0.6.2.i386.rpm
70e2a3b0e97bd39cf5041ed4abacda98  6.2/SRPMS/netscape-4.76-0.6.2.src.rpm
924dec1cde5eba83655c1aa1f93bad39  6.2/SRPMS/netscape-alpha-4.76-0.6.2.src.rpm
acbb0bcbca33eb41e396a9c7013e2d3d  6.2/alpha/netscape-common-4.76-0.6.2.alpha.rpm
5709be8e1656a2eff9fafe719f5528d2  6.2/alpha/netscape-communicator-4.76-0.6.2.alpha.rpm
9aa6f256592c3f96ee60c57b879618b2  6.2/alpha/netscape-navigator-4.76-0.6.2.alpha.rpm
b4a875d94e0947b16b9a973d23f6222b  6.2/i386/netscape-common-4.76-0.6.2.i386.rpm
fcde6218d7de0e9e009892c57e7f88ca  6.2/i386/netscape-communicator-4.76-0.6.2.i386.rpm
670b08cbad1097f4ca923071c202b5dd  6.2/i386/netscape-navigator-4.76-0.6.2.i386.rpm
81e1c3e9673ab1e2b498cf3fdaeabcc5  7.0/SRPMS/netscape-4.76-1.src.rpm
7faa76eb6405f45aeb6c41380b833967  7.0/SRPMS/netscape-alpha-4.76-1.src.rpm
199832fec88401961e33203adf3a27c2  7.0/alpha/netscape-common-4.76-1.alpha.rpm
29848ea9545c21d3bb0d8318265fd918  7.0/alpha/netscape-communicator-4.76-1.alpha.rpm
1f27bf46ccf8c7d0bfa7106240cc8174  7.0/alpha/netscape-navigator-4.76-1.alpha.rpm
3bb98e22f094236211955579c7ce49ad  7.0/i386/netscape-common-4.76-1.i386.rpm
fc03263dbbbe7f8f1031200d9a8e2022  7.0/i386/netscape-communicator-4.76-1.i386.rpm
3a12fb2d8d0187c7d3684b2a7cf4a9fc  7.0/i386/netscape-navigator-4.76-1.i386.rpm

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
     http://www.Red Hat.com/corp/contact.html

You can verify each package with the following command:
    rpm --checksig  

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg 

8. References:
 
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A66.netscape.asc


Copyright(c) 2000 Red Hat, Inc.


 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Canadians arrest a Heartbleed hacker
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.