Date: Tue, 4 Mar 2003 07:55:28 +0000 From: Matthew Seaman <m.seaman@infracaninophile.co.uk> To: Terry Todd <tlt@badger.tltodd.com> Cc: freebsd-questions@FreeBSD.ORG Subject: Re: Sendmail patch questions... Message-ID: <20030304075528.GA6551@happy-idiot-talk.infracaninophi> In-Reply-To: <20030303211505.A12165@badger.tltodd.com> References: <002701c2e1df$95fc1f00$0301a8c0@mike> <20030303204558.A5870@badger.tltodd.com> <20030303205326.A9819@badger.tltodd.com> <20030303211505.A12165@badger.tltodd.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, Mar 03, 2003 at 09:15:05PM -0600, Terry Todd wrote: > Is there a way to test that the vulnerability has been fixed? As Claus Assmann posted over in freebsd-security, you can test that your sendmail binary has been patched by: % strings /usr/libexec/sendmail/sendmail | grep 'Dropped invalid comments from header address' If that text is present in the binary, then you have a patched version. Cheers, Matthew -- Dr Matthew J Seaman MA, D.Phil. 26 The Paddocks Savill Way PGP: http://www.infracaninophile.co.uk/pgpkey Marlow Tel: +44 1628 476614 Bucks., SL7 1TH UK To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030304075528.GA6551>