LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 19th, 2014
Linux Advisory Watch: December 12th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandrake: 'netscape' buffer overflow Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
Mandrake A buffer overflow exists in the HTML parser code of the Netscape web browser in all versions prior to and including 4.75.

________________________________________________________________________

                Linux-Mandrake Security Update Advisory
________________________________________________________________________

Package name:           netscape
Date:                   December 14th, 2000
Advisory ID:            MDKSA-2000:080

Affected versions:      6.0, 6.1, 7.0, 7.1, 7.2
________________________________________________________________________

Problem Description:

 A buffer overflow exists in the HTML parser code of the Netscape web 
 browser in all versions prior to and including 4.75.  This buffer 
 overflow can be exploited by a remote attacker or web site.
________________________________________________________________________

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:
  rpm --checksig package.rpm
You can get the GPG public key of the Linux-Mandrake Security Team at
   http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS
If you use MandrakeUpdate, the verification of md5 checksum and GPG
signature is performed automatically for you.

Linux-Mandrake 6.0:
7a765a240a72e62e948fefecfdcbc5a1  6.0/RPMS/netscape-common-4.76-3.1mdk.i586.rpm
9317d66e4942793282cd1ff35f389849  6.0/RPMS/netscape-communicator-4.76-3.1mdk.i586.rpm
0738e861f38cccbb2a1d0acc7ccb3d37  6.0/RPMS/netscape-navigator-4.76-3.1mdk.i586.rpm
b5916860839dff94b63da356b27ff67c  6.0/SRPMS/netscape-4.76-3.1mdk.src.rpm

Linux-Mandrake 6.1:
7a765a240a72e62e948fefecfdcbc5a1  6.1/RPMS/netscape-common-4.76-3.1mdk.i586.rpm
9317d66e4942793282cd1ff35f389849  6.1/RPMS/netscape-communicator-4.76-3.1mdk.i586.rpm
0738e861f38cccbb2a1d0acc7ccb3d37  6.1/RPMS/netscape-navigator-4.76-3.1mdk.i586.rpm
b5916860839dff94b63da356b27ff67c  6.1/SRPMS/netscape-4.76-3.1mdk.src.rpm

Linux-Mandrake 7.0:
b566dcd5d6d1d4deebbfd75283d5febb  7.0/RPMS/netscape-castellano-4.76-2mdk.noarch.rpm
7a765a240a72e62e948fefecfdcbc5a1  7.0/RPMS/netscape-common-4.76-3.1mdk.i586.rpm
9317d66e4942793282cd1ff35f389849  7.0/RPMS/netscape-communicator-4.76-3.1mdk.i586.rpm
41f7595b53bddf2ed77f931d24b61e49  7.0/RPMS/netscape-francais-4.76-1mdk.noarch.rpm
0738e861f38cccbb2a1d0acc7ccb3d37  7.0/RPMS/netscape-navigator-4.76-3.1mdk.i586.rpm
6703445b94cba32592496bf011975a58  7.0/RPMS/netscape-walon-4.76-1mdk.noarch.rpm
b5916860839dff94b63da356b27ff67c  7.0/SRPMS/netscape-4.76-3.1mdk.src.rpm
e4e64765b0eb8828391b32dbfc7733fb  7.0/SRPMS/netscape-castellano-4.76-2mdk.src.rpm
68de739c1f08f07da85db47310d3d846  7.0/SRPMS/netscape-francais-4.76-1mdk.src.rpm
73db5ba30c10246d0c6bdcf341210653  7.0/SRPMS/netscape-walon-4.76-1mdk.src.rpm

Linux-Mandrake 7.1:
b566dcd5d6d1d4deebbfd75283d5febb  7.1/RPMS/netscape-castellano-4.76-2mdk.noarch.rpm
f221c1eff944f285d3c61cf6d06d77d2  7.1/RPMS/netscape-catalan-4.76-1mdk.noarch.rpm
440fdbf3c5f75f71ac11d065af780e95  7.1/RPMS/netscape-common-4.76-3.2mdk.i586.rpm
6508064e69862730fbf58d27d229688a  7.1/RPMS/netscape-communicator-4.76-3.2mdk.i586.rpm
8c15123428be8e01694390de2a54c741  7.1/RPMS/netscape-euskara-4.76-1mdk.noarch.rpm
41f7595b53bddf2ed77f931d24b61e49  7.1/RPMS/netscape-francais-4.76-1mdk.noarch.rpm
6f1265f1eb3320bb49765122d91f36a1  7.1/RPMS/netscape-navigator-4.76-3.2mdk.i586.rpm
973727c14a5aedf692fbe7bd34021393  7.1/RPMS/netscape-russian-4.76-1mdk.noarch.rpm
6703445b94cba32592496bf011975a58  7.1/RPMS/netscape-walon-4.76-1mdk.noarch.rpm
b021e45a6e7a15b967bf0ac6d7607c54  7.1/SRPMS/netscape-4.76-3.2mdk.src.rpm
e4e64765b0eb8828391b32dbfc7733fb  7.1/SRPMS/netscape-castellano-4.76-2mdk.src.rpm
998bed6307674e67e80f43b19bf6c51e  7.1/SRPMS/netscape-catalan-4.76-1mdk.src.rpm
99cd80ff338f95ccedf4d9fe68b188a0  7.1/SRPMS/netscape-euskara-4.76-1mdk.src.rpm
68de739c1f08f07da85db47310d3d846  7.1/SRPMS/netscape-francais-4.76-1mdk.src.rpm
966cf47246ed028a4a52ee0c0bad6d61  7.1/SRPMS/netscape-russian-4.76-1mdk.src.rpm
73db5ba30c10246d0c6bdcf341210653  7.1/SRPMS/netscape-walon-4.76-1mdk.src.rpm

Linux-Mandrake 7.2:
b566dcd5d6d1d4deebbfd75283d5febb  7.2/RPMS/netscape-castellano-4.76-2mdk.noarch.rpm
f221c1eff944f285d3c61cf6d06d77d2  7.2/RPMS/netscape-catalan-4.76-1mdk.noarch.rpm
e5423e05cf603032b0f2f15722f9f435  7.2/RPMS/netscape-common-4.76-3.3mdk.i586.rpm
a51f2cfaf43e67e67838983b2c15e644  7.2/RPMS/netscape-communicator-4.76-3.3mdk.i586.rpm
8c15123428be8e01694390de2a54c741  7.2/RPMS/netscape-euskara-4.76-1mdk.noarch.rpm
41f7595b53bddf2ed77f931d24b61e49  7.2/RPMS/netscape-francais-4.76-1mdk.noarch.rpm
01486d1b7c56867243637e33bde41daf  7.2/RPMS/netscape-german-4.76-1mdk.noarch.rpm
217e4f8f677de4450ac081936d69d3d8  7.2/RPMS/netscape-japanese-4.76-1mdk.noarch.rpm
5e406d757236d2d0f6795a851ca9980f  7.2/RPMS/netscape-navigator-4.76-3.3mdk.i586.rpm
a9cc0c280a2e4eccc3d313e92f88d9e6  7.2/RPMS/netscape-polish-4.76-1mdk.noarch.rpm
973727c14a5aedf692fbe7bd34021393  7.2/RPMS/netscape-russian-4.76-1mdk.noarch.rpm
fb6a6390ed8ac49edb3fa71d17b1490e  7.2/RPMS/netscape-spanish-4.76-1mdk.noarch.rpm
6703445b94cba32592496bf011975a58  7.2/RPMS/netscape-walon-4.76-1mdk.noarch.rpm
2fbfdc8f07784f79a37906f1ba7f0cb1  7.2/SRPMS/netscape-4.76-3.3mdk.src.rpm
e4e64765b0eb8828391b32dbfc7733fb  7.2/SRPMS/netscape-castellano-4.76-2mdk.src.rpm
998bed6307674e67e80f43b19bf6c51e  7.2/SRPMS/netscape-catalan-4.76-1mdk.src.rpm
99cd80ff338f95ccedf4d9fe68b188a0  7.2/SRPMS/netscape-euskara-4.76-1mdk.src.rpm
68de739c1f08f07da85db47310d3d846  7.2/SRPMS/netscape-francais-4.76-1mdk.src.rpm
5c7eee581703938c86b4ef27c541a40d  7.2/SRPMS/netscape-german-4.76-1mdk.src.rpm
f149babeb319de208376c086331551b8  7.2/SRPMS/netscape-japanese-4.76-1mdk.src.rpm
6895eb8e26597d77a109fd4c535ae1c1  7.2/SRPMS/netscape-polish-4.76-1mdk.src.rpm
966cf47246ed028a4a52ee0c0bad6d61  7.2/SRPMS/netscape-russian-4.76-1mdk.src.rpm
25a6b4438fcaf952c4d3b1f2ed5f1173  7.2/SRPMS/netscape-spanish-4.76-1mdk.src.rpm
73db5ba30c10246d0c6bdcf341210653  7.2/SRPMS/netscape-walon-4.76-1mdk.src.rpm
________________________________________________________________________

To upgrade automatically, use « MandrakeUpdate ».  

If you want to upgrade manually, download the updated package from one 
of our FTP server mirrors and uprade with "rpm -Fvh *.rpm".  

You can download the updates directly from one of the mirror sites
listed at:

   http://www.linux-mandrake.com/en/ftp.php3.  

Updated packages are available in the "updates/[ver]/RPMS/" directory.  
For example, if you are looking for an updated RPM package for
Linux-Mandrake 7.2, look for it in "updates/7.2/RPMS/".  Updated source
RPMs are available as well, but you generally do not need to download
them.

Please be aware that sometimes it takes the mirrors a few hours to 
update.

You can view other security advisories for Linux-Mandrake at:

   http://www.linux-mandrake.com/en/security/

If you want to report vulnerabilities, please contact

  security@linux-mandrake.com
________________________________________________________________________

Linux-Mandrake has two security-related mailing list services that 
anyone can subscribe to:

security-announce@linux-mandrake.com

  Linux-Mandrake's security announcements mailing list.  Only 
  announcements are sent to this list and it is read-only.

security-discuss@linux-mandrake.com

  Linux-Mandrake's security discussion mailing list.  This list is open
  to anyone to discuss Linux-Mandrake security specifically and Linux
  security in general.

To subscribe to either list, send a message to
  sympa@linux-mandrake.com
with "subscribe [listname]" in the body of the message.

To remove yourself from either list, send a message to
  sympa@linux-mandrake.com
with "unsubscribe [listname]" in the body of the message.

To get more information on either list, send a message to
  sympa@linux-mandrake.com
with "info [listname]" in the body of the message.

Optionally, you can use the web interface to subscribe to or unsubscribe
from either list:

   http://www.linux-mandrake.com/en/flists.php3#security
________________________________________________________________________


 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Report: U.S. planning “proportional response” to Sony hack, blamed on North Korea
Heartbleed, Shellshock, Tor and more: The 13 biggest security stories of 2014
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.