Mandrake Linux Security Advisory : netscape (MDKSA-2000:027-1)

High Nessus Plugin ID 61824


The remote Mandrake Linux host is missing one or more security updates.


Previous versions of Netscape, from version 3.0 to 4.73 contain a serious overflow flaw due to improper input verification in Netscape's JPEG processing code. The way Netscape processed JPEG comments trusted the length parameter for comment fields. By manipulating this value, it was possible to cause Netscape to read in an excessive amount of data which would then overwrite memory. Data with a malicious design could allow a remote site to execute arbitrary code as the user of Netscape on the client system. It is highly recommended that everyone using Netscape upgrade to this latest version that fixes the flaw.

Update :

The md5sums listed in the previous advisory are no longer valid. We are using the same RPM packages for 6.0, 6.1, and 7.0 so the md5ums have changed. The package for 7.1 has also been updated to incorporate many of the enhancements used in Linux-Mandrake 7.1


Update the affected packages.

Plugin Details

Severity: High

ID: 61824

File Name: mandrake_MDKSA-2000-027.nasl

Version: $Revision: 1.3 $

Type: local

Published: 2012/09/06

Modified: 2013/05/31

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:netscape-castellano, p-cpe:/a:mandriva:linux:netscape-catalan, p-cpe:/a:mandriva:linux:netscape-common, p-cpe:/a:mandriva:linux:netscape-communicator, p-cpe:/a:mandriva:linux:netscape-euskara, p-cpe:/a:mandriva:linux:netscape-francais, p-cpe:/a:mandriva:linux:netscape-navigator, p-cpe:/a:mandriva:linux:netscape-walon, cpe:/o:mandrakesoft:mandrake_linux:6.0, cpe:/o:mandrakesoft:mandrake_linux:6.1, cpe:/o:mandrakesoft:mandrake_linux:7.0, cpe:/o:mandrakesoft:mandrake_linux:7.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 2000/08/01

Reference Information

MDKSA: 2000:027-1