Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 15 Jan 2010 16:50:32 -0700
From:      Phil Oleson <oz@nixil.net>
To:        freebsd-security@freebsd.org
Subject:   sendmail 8.14.4 
Message-ID:  <4B50FF48.2070801@nixil.net>

next in thread | raw e-mail | index | archive | help

I'm seeing this in the release notes for the latest release of sendmail, plus a customers
PCI scan is reporting this as a problem.  I know many of these scans tend to do version 
string checks and don't actually check if the problem is possible to exploit, but I just
wanted your thoughts on if this is something the security team feels it needs to deal with
or not?

	-Phil.
  

8.14.4/8.14.4	2009/12/30
	SECURITY: Handle bogus certificates containing NUL characters
		in CNs by placing a string indicating a bad certificate
		in the {cn_subject} or {cn_issuer} macro.  Patch inspired
		by Matthias Andree's changes for fetchmail.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4B50FF48.2070801>