Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 3 Mar 2003 18:43:20 +0100
From:      Michael Nottebrock <michaelnottebrock@gmx.net>
To:        freebsd-security@freebsd.org
Subject:   sendmail vulnerability?
Message-ID:  <200303031843.25553.michaelnottebrock@gmx.net>

next in thread | raw e-mail | index | archive | help

--Boundary-02=_9Q5Y+RJJQd2qSuc
Content-Type: text/plain;
  charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Content-Description: signed data
Content-Disposition: inline

https://rhn.redhat.com/errata/RHSA-2003-073.html

Excerpt:

"During a code audit of Sendmail by ISS, a critical vulnerability was
uncovered that affects unpatched versions of Sendmail prior to version
8.12.8. A remote attacker can send a carefully crafted email message
which, when processed by sendmail, causes arbitrary code to be
executed as root."

Is FreeBSD's sendmail affected?

=2D-=20
Regards,
	Michael Nottebrock
--Boundary-02=_9Q5Y+RJJQd2qSuc
Content-Type: application/pgp-signature
Content-Description: signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (FreeBSD)

iD8DBQA+Y5Q9Xhc68WspdLARAr3hAJ0WrfDJSoNXmq7epZklyr4Wu53rtQCfZsY5
rB7wcfBvutekf0Z3EEqwQwM=
=b/jB
-----END PGP SIGNATURE-----

--Boundary-02=_9Q5Y+RJJQd2qSuc--


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200303031843.25553.michaelnottebrock>