[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: Netscape 4 Java buffer overflow
From: Jouko Pynnonen <jouko () solutions ! fi>
Date: 2002-11-26 18:12:56
[Download RAW message or body]
The Java implementation of Netscape 4 contains a buffer overflow
vulnerability. Arbitrary code may be run on a Netscape user's system
when a web page containing a malicious applet is viewed.
The buffer overflow happens in the method canConvert() of the class
sun.awt.windows.WDefaultFontCharset. An applet may trigger the overflow
by passing a long string to the constructor of the class and invoking the
method canConvert() on the created instance. In Java:
new WDefaultFontCharset(long_string).canConvert('x');
The vulnerability is trivial case of buffer overflow. Its
exploitability has been confirmed with an exploit which runs a program
when a web page is viewed.
Netscape 4 has a very limited user base nowadays. Other Netscape
versions use Sun Microsystem's Java Plug-in so they aren't vulnerable.
This vulnerability only affects the Windows platform which limits the
number of vulnerable systems further. The vulnerability doesn't appear
exploitable on other browsers. Netscape and Sun Microsystems were
informed about the problem in August 2002. Netscape 4 users can protect
themselves from the flaw by disabling Java in Preferences.
Jouko Pynnönen
jouko@solutions.fi
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic