SecurityTracker Alert ID: 1013643|
SecurityTracker URL: http://securitytracker.com/id/1013643
(Links to External Site)
Date: Apr 5 2005
Disclosure of system information, Disclosure of user information|
Exploit Included: Yes |
Version(s): 7.2 and prior versions|
The vulnerability resides in 'js/src/jsstr.c' in the find_replen() function.
A demonstration exploit is available at:
The vendor was notified on April 4, 2005.
A remote user can access random portions of browser memory.|
No solution was available at the time of this entry.|
Vendor URL: channels.netscape.com/ns/browsers/default.jsp (Links to External Site)
Access control error, State error|
|Underlying OS: Windows (Any)|
Source Message Contents
Netscape 7 web browser is confirmed and tested to vulnerable to issue
handled in SecurityTracker Alert ID 1013636.
Fix Available: No
Vendor Informed: Yes
Affected Version(s): 7.2 and prior
Underlying OS: Windows (Any)
Impact: See ID 1013636.
No solution was available at the time of this entry.
Edit / Preferences... / Advanced / Scripts & Plugins: remove selection
Vendor URL: http://www.netscape.com/ ,
Vendor was contacted on 4th April 2005 with Security Bug Report Form. It
is not possible to get reply by this form "(x) Check this checkbox to
indicate that you understand this is not a place to get support, and
that you will not receive a reply to the information you entered above.
You may not submit a bug report unless you check this box.".
Issue was tested with the following user agent (Windows XP Professional US):
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.2) Gecko/20040804