what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

nscape58.htm

nscape58.htm
Posted Jan 10, 2000
Site oliver.efri.hr

After executing the testommunicator 4.7 (NT/win2k) vulnerability - After executing the test hyperlink on beavuh.org's page on his client machine, he was able telnet to a remote shell on port 6968 of my client machine. Test your browser at www.beavuh.org.

tags | exploit, remote, shell
systems | windows
SHA-256 | e2a585f482ecb2acb3525271250492dd269005d88c07c89103a93cdef0239055

nscape58.htm

Change Mirror Download
<!DOCTYPE HTML PUBLIC "html.dtd">
<HTML>
<BODY BGCOLOR="#000000" TEXT="#FFFFFF"><PRE>
<FONT COLOR="#CC0000">COMMAND</FONT>

Netscape Communicator 4.7

<FONT COLOR="#CC0000">SYSTEMS AFFECTED</FONT>

Netscape Communicator 4.7 (NT/win2k)

<FONT COLOR="#CC0000">PROBLEM</FONT>

dark spyrit found following. Here's an exploit for the 4.7 hole
released not so long ago. Head to
<FONT COLOR="#00FF00">
http://www.beavuh.org
</FONT>
to test your system. It has been tested on NT only, but should
also work on win2k.. the exploit would need recoding for 9x -
More details are available on the page.

Zach Thompson tested this vulnerability on a Win2k Professional
machine (AKA WinNT WS 2000) running the currently downloadable
version of Communicator 4.7 and found it to be vulnerable. After
executing the test hyperlink on beavuh.org's page on his client
machine, he was able telnet to a remote shell on port 6968 of my
client machine.

One thing to note though. After clicking on this link,
Communicator stopped responding and Zach let it sit for about 3
minutes thinking it might come back. Eventually he had to kill it
with Task Manager. After killing Netscape, the remote shell was
lost on the target machine and the Telnet session was
disconnected. This only leaves a small amount of time for the
malicious person to exploit the remote shell before the end user
kills Netscape for not responding.

<FONT COLOR="#CC0000">SOLUTION</FONT>

It appears Netscape has patched the version that is currently
available for download.
</PRE></BODY>
</HTML>
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close