Netscape Java canConvert()缓冲区溢出漏洞

漏洞信息详情

Netscape Java canConvert()缓冲区溢出漏洞

漏洞简介

Netscape 4.0版本中的sun.awt.windows.WDefaultFontCharset Java类实现存在缓冲区溢出漏洞。远程攻击者可以通过调用具有超长字符的WDefaultFontCharset构造函数和调用canConvert方法的程序执行任意代码。

漏洞公告

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: XF
名称: netscape-applet-canconvert-bo(10706)
链接:http://xforce.iss.net/xforce/xfdb/10706

来源: BID
名称: 6256
链接:http://www.securityfocus.com/bid/6256

来源: BUGTRAQ
名称: 20021126 Netscape 4 Java buffer overflow
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=103834439321292&w=2

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享