This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing one or more security
Previous versions of Netscape, from version 3.0 to 4.73 contain a
serious overflow flaw due to improper input verification in Netscape's
JPEG processing code. The way Netscape processed JPEG comments trusted
the length parameter for comment fields. By manipulating this value,
it was possible to cause Netscape to read in an excessive amount of
data which would then overwrite memory. Data with a malicious design
could allow a remote site to execute arbitrary code as the user of
Netscape on the client system. It is highly recommended that everyone
using Netscape upgrade to this latest version that fixes the flaw.
The md5sums listed in the previous advisory are no longer valid. We
are using the same RPM packages for 6.0, 6.1, and 7.0 so the md5ums
have changed. The package for 7.1 has also been updated to incorporate
many of the enhancements used in Linux-Mandrake 7.1
Update the affected packages.
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now