Heap-based buffer overflow in Netscape and Mozilla allows remote attackers to execute arbitrary code via a jar: URL that references a malformed .jar file, which overflows a buffer during decompression.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Mozilla | Mozilla | 0.9.6 (including) | 0.9.6 (including) |
Mozilla | Mozilla | 0.9.7 (including) | 0.9.7 (including) |
Mozilla | Mozilla | 0.9.8 (including) | 0.9.8 (including) |
Mozilla | Mozilla | 0.9.9 (including) | 0.9.9 (including) |
Mozilla | Mozilla | 1.0 (including) | 1.0 (including) |
Mozilla | Mozilla | 1.0.1 (including) | 1.0.1 (including) |
Mozilla | Mozilla | 1.1 (including) | 1.1 (including) |
Navigator | Netscape | 6.2 (including) | 6.2 (including) |
Navigator | Netscape | 6.2.1 (including) | 6.2.1 (including) |
Navigator | Netscape | 6.2.2 (including) | 6.2.2 (including) |
Navigator | Netscape | 6.2.3 (including) | 6.2.3 (including) |
Navigator | Netscape | 7.0 (including) | 7.0 (including) |
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 | RedHat | * | |
Red Hat Enterprise Linux ES version 2.1 | RedHat | * | |
Red Hat Enterprise Linux WS version 2.1 | RedHat | * | |
Red Hat Linux 7.1 | RedHat | * | |
Red Hat Linux 7.2 | RedHat | * | |
Red Hat Linux 7.3 | RedHat | * | |
Red Hat Linux 8.0 | RedHat | * | |
Red Hat Linux Advanced Workstation 2.1 | RedHat | * |