Date: Mon, 3 Mar 2003 18:43:20 +0100 From: Michael Nottebrock <michaelnottebrock@gmx.net> To: freebsd-security@freebsd.org Subject: sendmail vulnerability? Message-ID: <200303031843.25553.michaelnottebrock@gmx.net>
next in thread | raw e-mail | index | archive | help
--Boundary-02=_9Q5Y+RJJQd2qSuc Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Content-Description: signed data Content-Disposition: inline https://rhn.redhat.com/errata/RHSA-2003-073.html Excerpt: "During a code audit of Sendmail by ISS, a critical vulnerability was uncovered that affects unpatched versions of Sendmail prior to version 8.12.8. A remote attacker can send a carefully crafted email message which, when processed by sendmail, causes arbitrary code to be executed as root." Is FreeBSD's sendmail affected? =2D-=20 Regards, Michael Nottebrock --Boundary-02=_9Q5Y+RJJQd2qSuc Content-Type: application/pgp-signature Content-Description: signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (FreeBSD) iD8DBQA+Y5Q9Xhc68WspdLARAr3hAJ0WrfDJSoNXmq7epZklyr4Wu53rtQCfZsY5 rB7wcfBvutekf0Z3EEqwQwM= =b/jB -----END PGP SIGNATURE----- --Boundary-02=_9Q5Y+RJJQd2qSuc-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200303031843.25553.michaelnottebrock>