Provided by Aanval (Snort & Syslog Intrusion Detection and Correlation Engine) www.aanval.com
--
GEN:SID | 1:311 |
Message | EXPLOIT Netscape 4.7 unsucessful overflow |
Summary | Versions of the Netscape browser including and prior to 4.75 are vulnerable to a buffer overflow that may lead to arbitrary code execution on the victim host. It is also possible to open a root shell listening on a high port on the victim host. This event is generated when a request is made to a web site exploiting this vulnerability. |
Impact | System compromize presenting the attacker with the opportunity to execute arbitrary code on the victim host. |
Detailed Information | A buffer overflow condition exists in the HTML parser on some versions of Netscape Navigator. It is possible for a remote attacker to execute arbitrary code on the victim host. It is possible to crash Netscape Communicator if a large number of characters is supplied in a command from an interactive web page. Affected Systems: Netscape Navigator 4.75 and prior |
Affected Systems | |
Attack Scenarios | The attacker would need to supply a link on a web page or HTML email that triggers the overflow. It is also possible to cause the overflow via HTML email. Exploit scripts are available |
Ease of Attack | Simple. Exploits are available. |
Corrective Action | Upgrade to the latest non-affected version of the software. |
Additional References | CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2000-1187 Bugtraq: http://www.securityfocus.com/bid/822 |
Rule References | arachnids: 214 bugtraq: 822 cve: 1999-1189 cve: 2000-1187 |
--
DID:773900
--
http://www.aanval.com/