1995-09-22 - Netscape bug update

Header Data

From: Ray Cromwell <rjc@clark.net>
To: cypherpunks@toad.com
Message Hash: 2aef82c42eff6806b5acf3499da69c254d175e9882f3c9dc8da266939f8bb52a
Message ID: <199509220626.CAB16453@clark.net>
Reply To: N/A
UTC Datetime: 1995-09-22 06:26:39 UTC
Raw Date: Thu, 21 Sep 95 23:26:39 PDT

Raw message

From: Ray Cromwell <rjc@clark.net>
Date: Thu, 21 Sep 95 23:26:39 PDT
To: cypherpunks@toad.com
Subject: Netscape bug update
Message-ID: <199509220626.CAB16453@clark.net>
MIME-Version: 1.0
Content-Type: text/plain



  I just verified in GDB using a stack trace that the Netscape overflow
bug I mentioned is indeed a static stack buffer overflow. It trashes
the stack.

  What this means is that in theory, it is possible to get a simple
URL, if clicked on, to execute some code on someone's browser.

  Now the hard work begins...


Happy Hacking,
-Ray





Thread