Certain versions of the Netscape FastTrack and Enterprise servers for both Unix and NT contain a remotely exploitable buffer overflow vulnerability. This vulnerability is present in both the Application and Administration servers shipped with the respective packages.The problem lies in the HTTP Basic Authentication procedure for both servers has a buffer overflow condition when a long username or password (over 508 characters) are provided. This may result in an attacker gaining root privileges under UNIX and SYSTEM privileges under NT. This vulnerability seems to affect mainly the NT versions of the software.
Certain versions of the Netscape FastTrack and Enterprise servers for both Unix and NT contain a remotely exploitable buffer overflow vulnerability. This vulnerability is present in both the Application and Administration servers shipped with the respective packages.The problem lies in the HTTP Basic Authentication procedure for both servers has a buffer overflow condition when a long username or password (over 508 characters) are provided. This may result in an attacker gaining root privileges under UNIX and SYSTEM privileges under NT. This vulnerability seems to affect mainly the NT versions of the software.