Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 19 Jan 2004 15:54:00 +0200
From:      Anton Alin-Adrian <aanton@reversedhell.net>
To:        freebsd-hackers@freebsd.org
Subject:   Re: qmail remote root patch
Message-ID:  <400BE178.1040302@reversedhell.net>
In-Reply-To: <010e01c3de91$e6daa9a0$0401a8c0@phantasm205>
References:  <400BD0CE.6050609@reversedhell.net> <010e01c3de91$e6daa9a0$0401a8c0@phantasm205>

next in thread | previous in thread | raw e-mail | index | archive | help
This is a multi-part message in MIME format.
--------------020506030407000302030809
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

This is the patch I am currently using, for qmail-smtpd.c . I don't dare 
to touch RFC because I did not carefully read qmail sources and I am not 
aware of details/impact.

I think this patch is good enough to simply remove the vulnerability.

I now looked more thoroughly at the code and ask other's opinions. I 
think this is really ok patch..

Regards,
Alin.




--------------020506030407000302030809
Content-Type: text/plain;
 name="qmail103p1.patch"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline;
 filename="qmail103p1.patch"

318a319
> 	++pos;
320d320
<       ++pos;

--------------020506030407000302030809--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?400BE178.1040302>