what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

rhsa.2000-046-02.netscape

rhsa.2000-046-02.netscape
Posted Jul 31, 2000
Site redhat.com

ReD Hat Security Advisory 46-02 - New netscape packages are available that fix a buffer overflow due to improper input verification in netscape's JPEG processing code which can result in remote compromise. It is recommended that users of netscape update to the fixed packages.

tags | remote, overflow
systems | linux, redhat
SHA-256 | 9154a8b3261c8bd167de85415172f1dd9801dbce0f66004ba3dd5ed6d8ba3ead

rhsa.2000-046-02.netscape

Change Mirror Download
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory

Synopsis: New netscape packages available to fix JPEG problem
Advisory ID: RHSA-2000:046-02
Issue date: 2000-07-28
Updated on: 2000-07-28
Product: Red Hat Linux
Keywords: netscpae JPEG
Cross references: N/A
---------------------------------------------------------------------

1. Topic:

New netscape packages are available that fix a potential
overflow due to improper input verification in netscape's JPEG
processing code. It is recommended that users of netscape update
to the fixed packages. Users of Red Hat Linux 6.0 and 6.1
should use the packages for Red Hat Linux 6.2.

2. Relevant releases/architectures:

Red Hat Linux 5.2 - i386
Red Hat Linux 6.0 - i386
Red Hat Linux 6.1 - i386
Red Hat Linux 6.2 - i386, alpha

3. Problem description:

Netscape's processing of JPEG comments trusted the length parameter
for comment fields; by manipulating this value, it would be possible
to cause netscape to read in an excessive amount of data, overwriting
memory. Specially designed data could allow a remote site to execute
arbitrary code as the user of netscape.

This vulnerability is fixed in Netscape 4.74.

4. Solution:

For each RPM for your particular architecture, run:

rpm -Fvh [filename]

where filename is the name of the RPM.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

10165 - Netscape mail client does not compact folders anymore
13695 - Small glitch in German translation
14506 - Upgrade of netscape-common fails
14657 - /usr/lib/netscape/de_DE: cpio: unlinkfailed


6. RPMs required:

Red Hat Linux 5.2:

i386:
ftp://updates.redhat.com/5.2/i386/netscape-common-4.74-0.5.2.i386.rpm
ftp://updates.redhat.com/5.2/i386/netscape-communicator-4.74-0.5.2.i386.rpm
ftp://updates.redhat.com/5.2/i386/netscape-navigator-4.74-0.5.2.i386.rpm

sources:
ftp://updates.redhat.com/5.2/SRPMS/netscape-4.74-0.5.2.src.rpm

Red Hat Linux 6.2:

alpha:
ftp://updates.redhat.com/6.2/alpha/netscape-common-4.74-1.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/netscape-communicator-4.74-1.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/netscape-navigator-4.74-1.alpha.rpm

i386:
ftp://updates.redhat.com/6.2/i386/netscape-common-4.74-0.6.2.i386.rpm
ftp://updates.redhat.com/6.2/i386/netscape-communicator-4.74-0.6.2.i386.rpm
ftp://updates.redhat.com/6.2/i386/netscape-navigator-4.74-0.6.2.i386.rpm

sources:
ftp://updates.redhat.com/6.2/SRPMS/netscape-alpha-4.74-1.src.rpm
ftp://updates.redhat.com/6.2/SRPMS/netscape-4.74-0.6.2.src.rpm

7. Verification:

MD5 sum Package Name
--------------------------------------------------------------------------
2520f9f234010f483d14ec524898ad29 5.2/SRPMS/netscape-4.74-0.5.2.src.rpm
2dd30f35857c05304e54253e7564634b 5.2/i386/netscape-common-4.74-0.5.2.i386.rpm
765fc5c8be9638560544379a3c7e1004 5.2/i386/netscape-communicator-4.74-0.5.2.i386.rpm
d6ecb766f5d979e2787f239fefcce8fd 5.2/i386/netscape-navigator-4.74-0.5.2.i386.rpm
64999688cbd3b6be723c72d94dcb0f72 6.2/SRPMS/netscape-4.74-0.6.2.src.rpm
e75ad6a500fa4ac0ef919f65aa8871bd 6.2/SRPMS/netscape-alpha-4.74-1.src.rpm
2796178bd0f400800d1fb5fccd39880b 6.2/alpha/netscape-common-4.74-1.alpha.rpm
2f2260eb8030751838f9d14a4eca71ae 6.2/alpha/netscape-communicator-4.74-1.alpha.rpm
db641b2f9b63c3f986dece1ecc482d32 6.2/alpha/netscape-navigator-4.74-1.alpha.rpm
2f2f1be58b481030eb2da12dcd9a6a54 6.2/i386/netscape-common-4.74-0.6.2.i386.rpm
6b2045ecf408024a64962705c6395a1f 6.2/i386/netscape-communicator-4.74-0.6.2.i386.rpm
03b93972ba0f114d4be9ef50a2a21fa5 6.2/i386/netscape-navigator-4.74-0.6.2.i386.rpm

These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
rpm --checksig <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>

8. References:

http://www.securityfocus.com/vdb/bottom.html?vid=15


Copyright(c) 2000 Red Hat, Inc.

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close