First published: Fri Nov 29 2002(Updated: )
Heap-based buffer overflow in Netscape and Mozilla allows remote attackers to execute arbitrary code via a jar: URL that references a malformed .jar file, which overflows a buffer during decompression.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Netscape Navigator | =6.2 | |
Mozilla Mozilla | =1.0.1 | |
Mozilla Mozilla | =0.9.7 | |
Netscape Navigator | =6.2.1 | |
Netscape Navigator | =7.0 | |
Mozilla Mozilla | =1.0 | |
Mozilla Mozilla | =0.9.8 | |
Netscape Navigator | =6.2.3 | |
Netscape Navigator | =6.2.2 | |
Mozilla Mozilla | =0.9.6 | |
Mozilla Mozilla | =1.1 | |
Mozilla Mozilla | =0.9.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1308 has a high severity rating due to the potential for remote code execution.
To fix CVE-2002-1308, update to the latest version of the affected Netscape or Mozilla browser.
CVE-2002-1308 affects multiple versions of Netscape Navigator and Mozilla, including versions up to 7.0 for Netscape and 1.1 for Mozilla.
The impact of CVE-2002-1308 allows attackers to execute arbitrary code if a user interacts with a malicious .jar file.
A possible workaround for CVE-2002-1308 is to avoid opening .jar files from untrusted sources until the vulnerability is patched.