Multiple Vendor Java Virtual Machine Listening Socket Vulnerability

BID:1545

Info

Multiple Vendor Java Virtual Machine Listening Socket Vulnerability

Bugtraq ID: 1545
Class: Origin Validation Error
CVE:
Remote: Yes
Local: Yes
Published: Aug 03 2000 12:00AM
Updated: Aug 03 2000 12:00AM
Credit: This vulnerability was discovered by Dan Brumleve <[email protected]>. Additional information provided by Hiromitsu Takagi <[email protected]> and Alexey Yarovinsky <[email protected]>.
Vulnerable: Sun JRE (Windows Production Release) 1.1.8
Sun JRE (Solaris Production Release) 1.1.8 _10
+ Sun Solaris 8_x86
+ Sun Solaris 8_sparc
+ Sun Solaris 7.0_x86
+ Sun Solaris 7.0
+ Sun Solaris 2.6_x86
+ Sun Solaris 2.6
Sun JRE (Solaris Production Release) 1.1.8 _009
Sun JRE (Solaris Production Release) 1.1.8
Sun JRE (Solaris Production Release) 1.1.7 B
+ Sun Solaris 8_x86
+ Sun Solaris 8_sparc
+ Sun Solaris 7.0_x86
+ Sun Solaris 7.0
+ Sun Solaris 2.6_x86
+ Sun Solaris 2.6
Sun JRE (Solaris Production Release) 1.1.6
+ Sun Solaris 8_x86
+ Sun Solaris 8_sparc
+ Sun Solaris 7.0_x86
+ Sun Solaris 7.0
+ Sun Solaris 2.6_x86
+ Sun Solaris 2.6
Sun JDK (Windows Production Release) 1.1.8 _002
Sun JDK (Windows Production Release) 1.1.7 B_005
Sun JDK (Windows Production Release) 1.1.6 _007
Sun JDK (Solaris Reference Release) 1.1.7 B_005
Sun JDK (Solaris Reference Release) 1.1.6 _007
Sun JDK (Solaris Production Release) 1.1.8 _11
+ Sun Solaris 8_x86
+ Sun Solaris 8_sparc
+ Sun Solaris 7.0_x86
+ Sun Solaris 7.0
+ Sun Solaris 2.6_x86
+ Sun Solaris 2.6
Sun JDK (Solaris Production Release) 1.1.8 _10
Sun JDK (Solaris Production Release) 1.1.8 _009
Sun JDK (Solaris Production Release) 1.1.8
Sun JDK (Solaris Production Release) 1.1.7 B
Sun JDK (Solaris Production Release) 1.1.6
Netscape Communicator 4.74
- Caldera OpenLinux Desktop 2.3
- Caldera OpenLinux eBuilder 3.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- Mandriva Linux Mandrake 6.1
- Mandriva Linux Mandrake 6.0
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Redhat Linux 6.2 sparc
- Redhat Linux 6.2 i386
- Redhat Linux 6.2 alpha
- Redhat Linux 6.1 sparc
- Redhat Linux 6.1 i386
- Redhat Linux 6.1 alpha
- Redhat Linux 6.0 sparc
- Redhat Linux 6.0 alpha
- Redhat Linux 6.0
- Redhat Linux 5.2 sparc
- Redhat Linux 5.2 i386
- Redhat Linux 5.2 alpha
- SCO eDesktop 2.4
- SCO eServer 2.3
- SuSE Linux 7.0
Netscape Communicator 4.73
- Caldera OpenLinux Desktop 2.3
- Caldera OpenLinux eBuilder 3.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- Mandriva Linux Mandrake 6.1
- Mandriva Linux Mandrake 6.0
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Redhat Linux 6.2 sparc
- Redhat Linux 6.2 i386
- Redhat Linux 6.2 alpha
- Redhat Linux 6.1 sparc
- Redhat Linux 6.1 i386
- Redhat Linux 6.1 alpha
- Redhat Linux 6.0 sparc
- Redhat Linux 6.0 alpha
- Redhat Linux 6.0
- Redhat Linux 5.2 sparc
- Redhat Linux 5.2 i386
- Redhat Linux 5.2 alpha
- SCO eDesktop 2.4
- SCO eServer 2.3
- SuSE Linux 7.0
Netscape Communicator 4.72
- Caldera OpenLinux Desktop 2.3
- Caldera OpenLinux eBuilder 3.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- Mandriva Linux Mandrake 6.1
- Mandriva Linux Mandrake 6.0
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Redhat Linux 6.2 sparc
- Redhat Linux 6.2 i386
- Redhat Linux 6.2 alpha
- Redhat Linux 6.1 sparc
- Redhat Linux 6.1 i386
- Redhat Linux 6.1 alpha
- Redhat Linux 6.0 sparc
- Redhat Linux 6.0 alpha
- Redhat Linux 6.0
- Redhat Linux 5.2 sparc
- Redhat Linux 5.2 i386
- Redhat Linux 5.2 alpha
- SCO eDesktop 2.4
- SCO eServer 2.3
- SuSE Linux 7.0
Netscape Communicator 4.61
- Caldera OpenLinux Desktop 2.3
- Caldera OpenLinux eBuilder 3.0
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0
- Redhat Linux 6.2 sparc
- Redhat Linux 6.2 i386
- Redhat Linux 6.2 alpha
- Redhat Linux 6.1 sparc
- Redhat Linux 6.1 i386
- Redhat Linux 6.1 alpha
- Redhat Linux 6.0 sparc
- Redhat Linux 6.0 alpha
- Redhat Linux 6.0
- Redhat Linux 5.2 sparc
- Redhat Linux 5.2 i386
- Redhat Linux 5.2 alpha
- SCO eDesktop 2.4
- SCO eServer 2.3
- SuSE Linux 7.0
Netscape Communicator 4.51
- Caldera OpenLinux Desktop 2.3
- Caldera OpenLinux eBuilder 3.0
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0
- Redhat Linux 6.2 sparc
- Redhat Linux 6.2 i386
- Redhat Linux 6.2 alpha
- Redhat Linux 6.1 sparc
- Redhat Linux 6.1 i386
- Redhat Linux 6.1 alpha
- Redhat Linux 6.0 sparc
- Redhat Linux 6.0 alpha
- Redhat Linux 6.0
- Redhat Linux 5.2 sparc
- Redhat Linux 5.2 i386
- Redhat Linux 5.2 alpha
- SCO eDesktop 2.4
- SCO eServer 2.3
- SuSE Linux 7.0
Netscape Communicator 4.7
- Caldera OpenLinux Desktop 2.3
- Caldera OpenLinux eBuilder 3.0
- FreeBSD FreeBSD 4.5
- FreeBSD FreeBSD 4.4
- FreeBSD FreeBSD 4.3
- FreeBSD FreeBSD 4.2
- FreeBSD FreeBSD 4.1.1
- FreeBSD FreeBSD 4.1
- FreeBSD FreeBSD 4.0
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Redhat Linux 6.2 sparc
- Redhat Linux 6.2 i386
- Redhat Linux 6.2 alpha
- Redhat Linux 6.1 sparc
- Redhat Linux 6.1 i386
- Redhat Linux 6.1 alpha
- Redhat Linux 6.0 sparc
- Redhat Linux 6.0 alpha
- Redhat Linux 6.0
- Redhat Linux 5.2 sparc
- Redhat Linux 5.2 i386
- Redhat Linux 5.2 alpha
- SCO eDesktop 2.4
- SCO eServer 2.3
- SuSE Linux 7.0
Netscape Communicator 4.6
- Caldera OpenLinux Desktop 2.3
- Caldera OpenLinux eBuilder 3.0
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0
- Redhat Linux 6.2 sparc
- Redhat Linux 6.2 i386
- Redhat Linux 6.2 alpha
- Redhat Linux 6.1 sparc
- Redhat Linux 6.1 i386
- Redhat Linux 6.1 alpha
- Redhat Linux 6.0 sparc
- Redhat Linux 6.0 alpha
- Redhat Linux 6.0
- Redhat Linux 5.2 sparc
- Redhat Linux 5.2 i386
- Redhat Linux 5.2 alpha
- SCO eDesktop 2.4
- SCO eServer 2.3
- SuSE Linux 7.0
Netscape Communicator 4.5
- Caldera OpenLinux Desktop 2.3
- Caldera OpenLinux eBuilder 3.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- Mandriva Linux Mandrake 6.1
- Mandriva Linux Mandrake 6.0
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0
- Redhat Linux 6.2 sparc
- Redhat Linux 6.2 i386
- Redhat Linux 6.2 alpha
- Redhat Linux 6.1 sparc
- Redhat Linux 6.1 i386
- Redhat Linux 6.1 alpha
- Redhat Linux 6.0 sparc
- Redhat Linux 6.0 alpha
- Redhat Linux 6.0
- Redhat Linux 5.2 sparc
- Redhat Linux 5.2 i386
- Redhat Linux 5.2 alpha
- SCO eDesktop 2.4
- SCO eServer 2.3
- SuSE Linux 7.0
Netscape Communicator 4.4
- Caldera OpenLinux Desktop 2.3
- Caldera OpenLinux eBuilder 3.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- Mandriva Linux Mandrake 6.1
- Mandriva Linux Mandrake 6.0
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0
- Redhat Linux 6.2 sparc
- Redhat Linux 6.2 i386
- Redhat Linux 6.2 alpha
- Redhat Linux 6.1 sparc
- Redhat Linux 6.1 i386
- Redhat Linux 6.1 alpha
- Redhat Linux 6.0 sparc
- Redhat Linux 6.0 alpha
- Redhat Linux 6.0
- Redhat Linux 5.2 sparc
- Redhat Linux 5.2 i386
- Redhat Linux 5.2 alpha
- SCO eDesktop 2.4
- SCO eServer 2.3
- SuSE Linux 7.0
Netscape Communicator 4.0
- Caldera OpenLinux Desktop 2.3
- Caldera OpenLinux eBuilder 3.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- Mandriva Linux Mandrake 6.1
- Mandriva Linux Mandrake 6.0
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0
- Redhat Linux 6.2 sparc
- Redhat Linux 6.2 i386
- Redhat Linux 6.2 alpha
- Redhat Linux 6.1 sparc
- Redhat Linux 6.1 i386
- Redhat Linux 6.1 alpha
- Redhat Linux 6.0 sparc
- Redhat Linux 6.0 alpha
- Redhat Linux 6.0
- Redhat Linux 5.2 sparc
- Redhat Linux 5.2 i386
- Redhat Linux 5.2 alpha
- SCO eDesktop 2.4
- SCO eServer 2.3
- SuSE Linux 7.0
Netscape Communicator 4.08
- Caldera OpenLinux Desktop 2.3
- Caldera OpenLinux eBuilder 3.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- Mandriva Linux Mandrake 6.1
- Mandriva Linux Mandrake 6.0
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0
- Redhat Linux 6.2 sparc
- Redhat Linux 6.2 i386
- Redhat Linux 6.2 alpha
- Redhat Linux 6.1 sparc
- Redhat Linux 6.1 i386
- Redhat Linux 6.1 alpha
- Redhat Linux 6.0 sparc
- Redhat Linux 6.0 alpha
- Redhat Linux 6.0
- Redhat Linux 5.2 sparc
- Redhat Linux 5.2 i386
- Redhat Linux 5.2 alpha
- SCO eDesktop 2.4
- SCO eServer 2.3
- SuSE Linux 7.0
Netscape Communicator 4.07
- Caldera OpenLinux Desktop 2.3
- Caldera OpenLinux eBuilder 3.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- Mandriva Linux Mandrake 6.1
- Mandriva Linux Mandrake 6.0
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0
- Redhat Linux 6.2 sparc
- Redhat Linux 6.2 i386
- Redhat Linux 6.2 alpha
- Redhat Linux 6.1 sparc
- Redhat Linux 6.1 i386
- Redhat Linux 6.1 alpha
- Redhat Linux 6.0 sparc
- Redhat Linux 6.0 alpha
- Redhat Linux 6.0
- Redhat Linux 5.2 sparc
- Redhat Linux 5.2 i386
- Redhat Linux 5.2 alpha
- SCO eDesktop 2.4
- SCO eServer 2.3
- SuSE Linux 7.0
Netscape Communicator 4.06
- Caldera OpenLinux Desktop 2.3
- Caldera OpenLinux eBuilder 3.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- Mandriva Linux Mandrake 6.1
- Mandriva Linux Mandrake 6.0
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0
- Redhat Linux 6.2 sparc
- Redhat Linux 6.2 i386
- Redhat Linux 6.2 alpha
- Redhat Linux 6.1 sparc
- Redhat Linux 6.1 i386
- Redhat Linux 6.1 alpha
- Redhat Linux 6.0 sparc
- Redhat Linux 6.0 alpha
- Redhat Linux 6.0
- Redhat Linux 5.2 sparc
- Redhat Linux 5.2 i386
- Redhat Linux 5.2 alpha
- SCO eDesktop 2.4
- SCO eServer 2.3
- SuSE Linux 7.0
Microsoft Virtual Machine 3300 Series
- Microsoft Internet Explorer 5.5
Microsoft Virtual Machine 3200 Series
+ Microsoft Internet Explorer 5.0.1
Microsoft Virtual Machine 3100 Series
+ Microsoft Internet Explorer 5.0 for Windows NT 4
+ Microsoft Internet Explorer 5.0 for Windows 98
+ Microsoft Internet Explorer 5.0 for Windows 95
+ Microsoft Internet Explorer 5.0 for Windows 2000
Microsoft Virtual Machine 2000 Series
+ Microsoft Internet Explorer 4.0 for Windows NT 4
+ Microsoft Internet Explorer 4.0 for Windows NT 3
+ Microsoft Internet Explorer 4.0 for Windows 95
+ Microsoft Internet Explorer 4.0
Not Vulnerable: Sun JRE (Windows Production Release) 1.1.8 _005
Sun JRE (Windows Production Release) 1.1.7 B_007
Sun JRE (Windows Production Release) 1.1.6 _09
Sun JRE (Solaris Reference Release) 1.1.8 _005
Sun JRE (Solaris Reference Release) 1.1.7 B_007
Sun JRE (Solaris Reference Release) 1.1.6 _009
Sun JRE (Solaris Production Release) 1.1.8 _12
Sun JDK (Windows Production Release) 1.1.8 _005
Sun JDK (Windows Production Release) 1.1.7 B_007
Sun JDK (Windows Production Release) 1.1.6 _009
Sun JDK (Solaris Reference Release) 1.1.8 _005
Sun JDK (Solaris Reference Release) 1.1.7 B_007
Sun JDK (Solaris Reference Release) 1.1.6 _009
Sun JDK (Solaris Production Release) 1.1.8 _12
Netscape Netscape 6.0
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0
Netscape Communicator 4.75
- Caldera OpenLinux Desktop 2.3
- Caldera OpenLinux eBuilder 3.0
- Mandriva Linux Mandrake 7.1
- Mandriva Linux Mandrake 7.0
- Mandriva Linux Mandrake 6.1
- Mandriva Linux Mandrake 6.0
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Redhat Linux 6.2 sparc
- Redhat Linux 6.2 i386
- Redhat Linux 6.2 alpha
- Redhat Linux 6.1 sparc
- Redhat Linux 6.1 i386
- Redhat Linux 6.1 alpha
- Redhat Linux 6.0 sparc
- Redhat Linux 6.0 alpha
- Redhat Linux 6.0
- Redhat Linux 5.2 sparc
- Redhat Linux 5.2 i386
- Redhat Linux 5.2 alpha
- SCO eDesktop 2.4
- SCO eServer 2.3
+ SGI IRIX 6.5.12
+ SGI IRIX 6.5.11
- SuSE Linux 7.0

Discussion

Multiple Vendor Java Virtual Machine Listening Socket Vulnerability

A set of flaws in multiple vendors' Java implementation allows a malicious applet to open a listening socket to accept network connections against the security policy.

Java applications use the java.net.ServerSocket class to create a listening network socket on which to accept network connections. The server socket class should use the SecurityManager.checkListen() method to determine whether a class is allowed to create a server side listening socket. A SecurityException should be thrown if the class is not allowed to create such socket. By default untrusted classes such as applets should not be allowed to create such sockets. The implementation of Java fails to throw a SecurityException when an applet create a ServerSocket.

After a ServerSocket object has been created an application must accept network connections by called the ServerSocket.accept() method or by subclassing the ServerSocket class an using the ServerSocket.implAccept() method of ServerSocket to implement their own accept method. The ServerSocket.accept() method normally calls the SecurityManager.checkAccept() method to determine if a class can accept a server connection.

The ServerSocket.accept() and the ServerSocket.implAccept() methods both accept the network connection before determining if the class can accept the connection. This is done to determine the remote address and remote port number of the connection. If the connection should not be accepted these methods shutdown the connection by calling the socket's Socket.close() method, and then throwing a SecurityException.

Because the ServerSocket.implAccept() method takes as an argument a Socket object to use for the connection a malicious class can pass it an object which is subclass of the Socket class that overloads its close() method not to close the socket. By then ignoring the SecurityException the malicious class can now accept the connection and make use of the socket.

Sun's implementation of the ServerSocket.implAccept() method seems to have closed the second vulnerability by calling the Socket.impl.close() method instead of the Socket.close() method.

By combining these two flaws a malicious applet can accept connections from any host.

Both Netscape and Microsoft Java Virtual Machines are affected by this vulnerability, however in Microsoft products the file: URL type will not be effective in reading files, meaning that only web-available documents can be retreived via this method. However, the file: method will verify the existence of a file. It will check to see if the file exists and if it does not, it will return a SecurityException error message. Netscape browsers will pass both web documents and local files to the attacker.

Exploit / POC

Multiple Vendor Java Virtual Machine Listening Socket Vulnerability

Dan Brumleve <[email protected]> has released the exploit Brown Orifice (BOHTTPD-0.1.tar.gz).

Alexey Yarovinsky <[email protected]> has set up the following demonstration page for Microsoft Internet Explorer:
http://www.oltres.com/ms-bug/

Solution / Fix

Multiple Vendor Java Virtual Machine Listening Socket Vulnerability

Solution:
Sun has released fixes to address this issue. Please see referenced Sun Alert (ID: 23604), for further detail regarding obtaining and applying appropriate fixes.

Netscape has released Netscape Communicator 4.75 which is not susceptible to this vulnerability.

Microsoft has released patches for each affected version of Virtual Machine. To find out the version of Virtual Machine you are running, please read 'Frequently Asked Questions: Microsoft Security Bulletin (MS00-059)' under the Reference tab.

Debian Security has provided the following upgrades:

Source archives:
http://security.debian.org/dists/potato/updates/non-free/source/netscape4.75_4.75-1potato1.diff.gz
MD5 checksum: 99ab453006b123ade6b62d508052e8aa

http://security.debian.org/dists/potato/updates/non-free/source/netscape4.75_4.75-1potato1.dsc
MD5 checksum: b6c8220d540580c62302e51bd310273c

http://security.debian.org/dists/potato/updates/non-free/source/netscape4.75_4.75.orig.tar.gz
MD5 checksum: 291d418188dd0d859c842b8e511f40dd

http://security.debian.org/dists/potato/updates/non-free/source/netscape4.base_4.75-1.dsc
MD5 checksum: 834ccd2acc61052bf9b01f58c5adb767

http://security.debian.org/dists/potato/updates/non-free/source/netscape4.base_4.75-1.tar.gz
MD5 checksum: c9f71e888d9ce42d7317a7a8255a25f4

Intel ia32 architecture:
http://security.debian.org/dists/potato/updates/non-free/binary-i386/communicator-base-475_4.75-1potato1_i386.deb
MD5 checksum: 401b63408d1477978fe16a855b9b2a14

http://security.debian.org/dists/potato/updates/non-free/binary-i386/communicator-nethelp-475_4.75-1potato1_all.deb
MD5 checksum: 763d8c075f0200d77ce1ad91af3d4c27

http://security.debian.org/dists/potato/updates/non-free/binary-i386/communicator-smotif-475-libc5_4.75-1potato1_i386.deb
MD5 checksum: d255e35d8365486b28a6e5c02bdf7e80

http://security.debian.org/dists/potato/updates/non-free/binary-i386/communicator-smotif-475_4.75-1potato1_i386.deb
MD5 checksum: a8b595e4ba544861109e91cf2f494d67

http://security.debian.org/dists/potato/updates/non-free/binary-i386/communicator-spellchk-475_4.75-1potato1_all.deb
MD5 checksum: 2c42207d48399b1d9ea757a1ee677414

http://security.debian.org/dists/potato/updates/non-free/binary-i386/communicator_4.75-1_i386.deb
MD5 checksum: 3b67100464ed0aa6a22bef337c14798f

http://security.debian.org/dists/potato/updates/non-free/binary-i386/navigator-base-475_4.75-1potato1_i386.deb
MD5 checksum: f4ed466d94b761b3a5f252c859c1c38d

http://security.debian.org/dists/potato/updates/non-free/binary-i386/navigator-nethelp-475_4.75-1potato1_all.deb
MD5 checksum: 3e671e3bd853557df55915a395f57d39

http://security.debian.org/dists/potato/updates/non-free/binary-i386/navigator-smotif-475-libc5_4.75-1potato1_i386.deb
MD5 checksum: d46984adbf2703f26a5bbd1cff912967

http://security.debian.org/dists/potato/updates/non-free/binary-i386/navigator-smotif-475_4.75-1potato1_i386.deb
MD5 checksum: 3e7de9bb9c0c8c73519c3b7149de6af4

http://security.debian.org/dists/potato/updates/non-free/binary-i386/navigator_4.75-1_i386.deb
MD5 checksum: a4f735e76fb26bc46a99edb557e41d43

http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-base-4-libc5_4.75-1_i386.deb
MD5 checksum: be2014f7b47913fc2d40dd3a2f7dc60f

http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-base-475_4.75-1potato1_i386.deb
MD5 checksum: 4cae30606eb234d79c0469ad3e430ece

http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-base-4_4.75-1_i386.deb
MD5 checksum: e594f5e58bfab22b5c4333d6e648b8bc

http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-ja-resource-475_4.75-1potato1_all.deb
MD5 checksum: 2f5aadfe24499b6ed79d7c1810aedb70

http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-java-475_4.75-1potato1_all.deb
MD5 checksum: 2b1d1abed84ac00eef02de530ad95028

http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-ko-resource-475_4.75-1potato1_all.deb
MD5 checksum: b2335dabae4430a69773ba22b3d5100c

http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-smotif-475-libc5_4.75-1potato1_i386.deb
MD5 checksum: 2397e4c0d8e556ea457b0095ad102d96

http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-smotif-475_4.75-1potato1_i386.deb
MD5 checksum: 45f1df641dc6869f880ee32abc1c8eb2

http://security.debian.org/dists/potato/updates/non-free/binary-i386/netscape-zh-resource-475_4.75-1potato1_all.deb
MD5 checksum: 5cb68c9bf8a895488c4a75145c48c915

TurboLinux has provided the following fix information:
Update the package from our ftp server by running the following command
for then package:

rpm -Uvh --nodeps --Force ftp_path_to_filename

Where ftp_path_to_filename is the following:

ftp://ftp.turbolinux.com/pub/updates/6.0/security/netscape-communicator-4.75-1.i386.rpm

The source RPM can be downloaded here:

ftp://ftp.turbolinux.com/pub/updates/6.0/SRPMS/netscape-communicator-4.75-1.src.rpm

**Note: You must rebuild and install the RPM if you choose to download
and install the SRPM. Simply installing the SRPM alone WILL NOT CLOSE
THE SECURITY HOLE.

Please verify the MD5 checksum of the update before you install:

MD5 sum Package Name
---------------------------------------------------------------------------
c99bfe042efb64bac1e9838d57ef7bd5 netscape-communicator-4.75-1.i386
___________________________________________________________________________

These packages are GPG signed by Turbolinux for security. Our key
is available here:

http://www.turbolinux.com/security/tlgpgkey.asc

To verify a package, use the following command:

rpm --checksig name_of_rpm

To examine only the md5sum, use the following command:

rpm --checksig --nogpg name_of_rpm

**Note: Checking GPG keys requires RPM 3.0 or higher.


Netscape Communicator 4.07

Microsoft Virtual Machine 2000 Series

Netscape Communicator 4.06

Microsoft Virtual Machine 3300 Series

Microsoft Virtual Machine 3100 Series

Microsoft Virtual Machine 3200 Series

Netscape Communicator 4.08

Netscape Communicator 4.0

Netscape Communicator 4.4

Netscape Communicator 4.5

Netscape Communicator 4.51

Netscape Communicator 4.6

Netscape Communicator 4.61

Netscape Communicator 4.7

Netscape Communicator 4.72

Netscape Communicator 4.73

Netscape Communicator 4.74

References

Multiple Vendor Java Virtual Machine Listening Socket Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report