GEN:SID 1:283
Message EXPLOIT Netscape 4.7 client overflow
Summary Versions of the Netscape browser including and prior to 4.75 are vulnerable to a buffer overflow that may lead to a root shell listening on port 6968. This event is generated when a request is made to a web site exploiting this vulnerability.
Impact System compromize presenting the attacker with the opportunity to
gain remote access to the victim host.
Detailed Information A buffer overflow condition exists in the HTML parser on some versions of Netscape Navigator. It is possible for a remote attacker to gain a root shell on the victim host.

A long password value in a form field may result in an attacker being able to execute arbitrary commands.

Affected Systems:
    Netscape Navigator 4.75 and prior
Affected Systems  
Attack Scenarios The attacker would need to supply a link on a web page or HTML email that triggers the overflow.

Exploit scripts are available
Ease of Attack Simple. Exploits are available.
Corrective Action Upgrade to the latest non-affected version of the software.
Additional References CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-1189

Arachnids:
http://www.whitehats.com/info/IDS215

Bugtraq:
http://www.securityfocus.com/bid/822
Rule References arachnids: 215
bugtraq: 822
cve: 1999-1189
cve: 2000-1187