Highly critical vulnerability in Netscape 7.x

There’s no question about it – 2004 will be marked in history as the ‘Year of Browser Vulnerabilities’.

We saw BMP and JPEG processing vulnerabilities in Internet Explorer. And now there’s a similar vulnerability in Netscape – which was once most widely used browser. It’s still used by millions of people around the world.

The vulnerability is connected with an error in the processing of PNG (Portable Network Graphics) files. It is identified by the famous Denmark company Secunia. The vulnerability can be used by a remote malicious attacker to execute random code on the victim computer. The victim only has to open a specially crafted PNG file using the browser for the computer to be at risk.

Secunia’s advisory says the vulnerability is highly critical – because there is no patch available.

You can

Highly critical vulnerability in Netscape 7.x

Your email address will not be published. Required fields are marked *



The leap of a Cycldek-related threat actor

The investigation described in this article started with one such file which caught our attention due to the various improvements it brought to this well-known infection vector.

Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Subscribe to our weekly e-mails

The hottest research right in your inbox