Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 4 Mar 2003 07:55:28 +0000
From:      Matthew Seaman <m.seaman@infracaninophile.co.uk>
To:        Terry Todd <tlt@badger.tltodd.com>
Cc:        freebsd-questions@FreeBSD.ORG
Subject:   Re: Sendmail patch questions...
Message-ID:  <20030304075528.GA6551@happy-idiot-talk.infracaninophi>
In-Reply-To: <20030303211505.A12165@badger.tltodd.com>
References:  <002701c2e1df$95fc1f00$0301a8c0@mike> <20030303204558.A5870@badger.tltodd.com> <20030303205326.A9819@badger.tltodd.com> <20030303211505.A12165@badger.tltodd.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, Mar 03, 2003 at 09:15:05PM -0600, Terry Todd wrote:
 
> Is there a way to test that the vulnerability has been fixed?

As Claus Assmann posted over in freebsd-security, you can test that
your sendmail binary has been patched by:

    % strings /usr/libexec/sendmail/sendmail | grep 'Dropped invalid comments from header address'

If that text is present in the binary, then you have a patched
version.

	Cheers,

	Matthew

-- 
Dr Matthew J Seaman MA, D.Phil.                       26 The Paddocks
                                                      Savill Way
PGP: http://www.infracaninophile.co.uk/pgpkey         Marlow
Tel: +44 1628 476614                                  Bucks., SL7 1TH UK

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030304075528.GA6551>