Date: Mon, 19 Jan 2004 15:54:00 +0200 From: Anton Alin-Adrian <aanton@reversedhell.net> To: freebsd-hackers@freebsd.org Subject: Re: qmail remote root patch Message-ID: <400BE178.1040302@reversedhell.net> In-Reply-To: <010e01c3de91$e6daa9a0$0401a8c0@phantasm205> References: <400BD0CE.6050609@reversedhell.net> <010e01c3de91$e6daa9a0$0401a8c0@phantasm205>
next in thread | previous in thread | raw e-mail | index | archive | help
This is a multi-part message in MIME format. --------------020506030407000302030809 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit This is the patch I am currently using, for qmail-smtpd.c . I don't dare to touch RFC because I did not carefully read qmail sources and I am not aware of details/impact. I think this patch is good enough to simply remove the vulnerability. I now looked more thoroughly at the code and ask other's opinions. I think this is really ok patch.. Regards, Alin. --------------020506030407000302030809 Content-Type: text/plain; name="qmail103p1.patch" Content-Transfer-Encoding: 7bit Content-Disposition: inline; filename="qmail103p1.patch" 318a319 > ++pos; 320d320 < ++pos; --------------020506030407000302030809--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?400BE178.1040302>