From owner-freebsd-isp@FreeBSD.ORG Mon Mar 31 09:09:55 2003 Return-Path: Delivered-To: freebsd-isp@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 907D637B401 for ; Mon, 31 Mar 2003 09:09:55 -0800 (PST) Received: from dragon.realtime.net (dragon.realtime.net [205.238.132.78]) by mx1.FreeBSD.org (Postfix) with SMTP id BA45443FDD for ; Mon, 31 Mar 2003 09:09:54 -0800 (PST) (envelope-from freebsd@realtime.net) Received: from r00t.realtime.net ([205.238.159.6]) by dragon.realtime.net ; Mon, 31 Mar 2003 10:48:47 -0600 Message-Id: <5.1.1.6.2.20030331103102.04fd5770@pop3.realtime.net> X-Sender: freebsd@none (Unverified) X-Mailer: QUALCOMM Windows Eudora Version 5.1.1 Date: Mon, 31 Mar 2003 10:38:09 -0600 To: freebsd-isp@freebsd.org From: Albert Meyer Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Subject: Sendmail exploit X-BeenThere: freebsd-isp@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Internet Services Providers List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 31 Mar 2003 17:09:56 -0000 The CERT advisory on the new Sendmail exploit seems to be saying that Sendmail machines behind a firewall can still be exploited. Am I interpreting the advisory correctly, or are they just saying that machines behind the firewall can be subjected to DOS attacks?