From: Ray Cromwell <rjc@clark.net>
To: cypherpunks@toad.com
Message Hash: 2aef82c42eff6806b5acf3499da69c254d175e9882f3c9dc8da266939f8bb52a
Message ID: <199509220626.CAB16453@clark.net>
Reply To: N/A
UTC Datetime: 1995-09-22 06:26:39 UTC
Raw Date: Thu, 21 Sep 95 23:26:39 PDT
From: Ray Cromwell <rjc@clark.net>
Date: Thu, 21 Sep 95 23:26:39 PDT
To: cypherpunks@toad.com
Subject: Netscape bug update
Message-ID: <199509220626.CAB16453@clark.net>
MIME-Version: 1.0
Content-Type: text/plain
I just verified in GDB using a stack trace that the Netscape overflow
bug I mentioned is indeed a static stack buffer overflow. It trashes
the stack.
What this means is that in theory, it is possible to get a simple
URL, if clicked on, to execute some code on someone's browser.
Now the hard work begins...
Happy Hacking,
-Ray
Return to September 1995
Return to “Ray Cromwell <rjc@clark.net>”