Mandrake Linux Security Advisory : netscape (MDKSA-2000:027-1)

high Nessus Plugin ID 61824

Synopsis

The remote Mandrake Linux host is missing one or more security updates.

Description

Previous versions of Netscape, from version 3.0 to 4.73 contain a serious overflow flaw due to improper input verification in Netscape's JPEG processing code. The way Netscape processed JPEG comments trusted the length parameter for comment fields. By manipulating this value, it was possible to cause Netscape to read in an excessive amount of data which would then overwrite memory. Data with a malicious design could allow a remote site to execute arbitrary code as the user of Netscape on the client system. It is highly recommended that everyone using Netscape upgrade to this latest version that fixes the flaw.

Update :

The md5sums listed in the previous advisory are no longer valid. We are using the same RPM packages for 6.0, 6.1, and 7.0 so the md5ums have changed. The package for 7.1 has also been updated to incorporate many of the enhancements used in Linux-Mandrake 7.1

Solution

Update the affected packages.

Plugin Details

Severity: High

ID: 61824

File Name: mandrake_MDKSA-2000-027.nasl

Version: 1.6

Type: local

Published: 9/6/2012

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:netscape-castellano, p-cpe:/a:mandriva:linux:netscape-catalan, p-cpe:/a:mandriva:linux:netscape-common, p-cpe:/a:mandriva:linux:netscape-communicator, p-cpe:/a:mandriva:linux:netscape-euskara, p-cpe:/a:mandriva:linux:netscape-francais, p-cpe:/a:mandriva:linux:netscape-navigator, p-cpe:/a:mandriva:linux:netscape-walon, cpe:/o:mandrakesoft:mandrake_linux:6.0, cpe:/o:mandrakesoft:mandrake_linux:6.1, cpe:/o:mandrakesoft:mandrake_linux:7.0, cpe:/o:mandrakesoft:mandrake_linux:7.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 8/1/2000

Reference Information

MDKSA: 2000:027-1