From owner-freebsd-security Thu Nov 15 11:14:37 2001 Delivered-To: freebsd-security@freebsd.org Received: from pa169.kurdwanowa.sdi.tpnet.pl (pa169.kurdwanowa.sdi.tpnet.pl [213.77.148.169]) by hub.freebsd.org (Postfix) with ESMTP id 9325237B41A for ; Thu, 15 Nov 2001 11:14:24 -0800 (PST) Received: by pa169.kurdwanowa.sdi.tpnet.pl (Postfix, from userid 1001) id 263511DA7; Thu, 15 Nov 2001 20:14:14 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by pa169.kurdwanowa.sdi.tpnet.pl (Postfix) with ESMTP id C373655A2 for ; Thu, 15 Nov 2001 20:14:14 +0100 (CET) Date: Thu, 15 Nov 2001 20:14:14 +0100 (CET) From: Krzysztof Zaraska X-Sender: kzaraska@lhotse.zaraska.dhs.org To: freebsd-security@freebsd.org Subject: Postfix Memory Exhaustion Attack Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Wieste Venema has posted information about Postfix SMTP server memory exhaustion attack on BUGTRAQ. You may read it at: http://www.securityfocus.org/archive/1/240354 The patch is included. FreeBSD port is probably vulnerable (can someone confirm this?). To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message