Forum: Community Center


Subject: 'Extremely Critical' Flaw Threatens Internet Explorer Users

elizabyte opened this issue on Jan 11, 2005 ยท 53 posts


Jaqui posted Tue, 11 January 2005 at 11:07 PM

turn off activex, turn off javascript. do not run any scripts you have not checked line by line first. even with mozilla/firefox/netscape since they are all the same browser.

Quote - (1) HIGH: Mozilla NNTP Protocol Processing Overflow Affected: Mozilla version 1.7.3 and prior Description: Mozilla browser supports NNTP (news) protocol and interprets "news://" URLs. The browser contains a heap-based buffer overflow that can be triggered by an overlong news URL ending in a "" (backslash) character. A malicious webpage or an HTML email may possibly exploit the flaw to execute arbitrary code on the system running the browser. Mozilla developers initially reported that the flaw cannot be exploited to execute arbitrary code. However, the discoverer has posted a proof-of-concept exploit that overwrites heap memory with the user-supplied data. Status: Mozilla confirmed, upgrade to version 1.7.5. The discussion on MozillaZine indicates that Firefox prior to version 1.0 may also be affected. Hence, upgrade Firefox to version 1.0. Council Site Actions: The affected software is not in production or widespread use, or is not officially supported at any of the council sites. They reported that no action was necessary. Several of the sites commented that they block NNTP at their network security perimeter. References: Posting by Maurycy Prodeus http://www.isec.pl/vulnerabilities/isec-0020-mozilla.txt Mozilla Bugzilla Entry https://bugzilla.mozilla.org/show_bug.cgi?id=264388 Discussion on MozillaZine News http://www.mozillazine.org/talkback.html?article=5844 SecurityFocus BID http://www.securityfocus.com/bid/12131