1995-09-28 - Re: Another Netscape Bug (and possible security hole)

Header Data

From: jsw@neon.netscape.com (Jeff Weinstein)
To: cypherpunks@toad.com
Message Hash: 0edb19c9cf0fb42494c7f9083651851c0d7034f40beab8bb959a1928d5f160f2
Message ID: <44dd09$b36@tera.mcom.com>
Reply To: <9508278122.AA812233405@ax.asc-yf.wpafb.af.mil>
UTC Datetime: 1995-09-28 05:49:54 UTC
Raw Date: Wed, 27 Sep 95 22:49:54 PDT

Raw message

From: jsw@neon.netscape.com (Jeff Weinstein)
Date: Wed, 27 Sep 95 22:49:54 PDT
To: cypherpunks@toad.com
Subject: Re: Another Netscape Bug (and possible security hole)
In-Reply-To: <9508278122.AA812233405@ax.asc-yf.wpafb.af.mil>
Message-ID: <44dd09$b36@tera.mcom.com>
MIME-Version: 1.0
Content-Type: text/plain


In article <9508278122.AA812233405@ax.asc-yf.wpafb.af.mil>, donlonm@ccmail.mcclellan.af.mil writes:
> Ray,
> 
> You wrote:
> 
> >I've found a Netscape bug which I suspect is a buffer overflow and 
> >may have the potential for serious damage. If it is an overflow bug, 
> >then it may be possible to infect every computer which accesses a web 
> >page with Netscape. 
> 
> Is there any way to avoid/prevent this problem by changing options in 
> NetScape?

  Just get the fixed version, or a patch from:

ftp://ftp.netscape.com/pub/netscape/

	--Jeff

-- 
Jeff Weinstein - Electronic Munitions Specialist
Netscape Communication Corporation
jsw@netscape.com - http://home.netscape.com/people/jsw
Any opinions expressed above are mine.





Thread