I have found a buffer overflow in Netscape Communicator probably affecting all 
versions. The problem occurs when Communicator
attempts to validate any key where the key length is > 2k.  I have tested this on 4.61 
and 4.7, unix (Irix) and Windows.  Netscape
has been notified of the problem and expect a fix for 4.8.

As the problem manifests during the check of the key, any portion of the key chain 
which has a key > 2k triggers the problem.  Thus,
the potential for widespread DoS attacks via email.  I suspect, but have not pursued, 
the possibility of exploiting the overflow to
execute arbitrary code.
--
Michael Breuer
[EMAIL PROTECTED]

Reply via email to