[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [cobalt-users] Sendmail bug fix.
- Subject: Re: [cobalt-users] Sendmail bug fix.
- From: René Mølsted <molsted@xxxxxxxxxxxx>
- Date: Tue Mar 4 04:59:00 2003
- List-id: Mailing list for users to share thoughts on Sun Cobalt products. <cobalt-users.list.cobalt.com>
For RaQ3
http://ns2.solarspeed.net/downloads/RaQ3-Sendmail-8.9.3C7sol1.pkg
For RaQ4
http://ns2.solarspeed.net/downloads/RaQ4-Sendmail-8.10.2-C1sol1.pkg
For RaQ550
http://ns2.solarspeed.net/downloads/RaQ550-Sendmail-8.11.6-1C4sol1.pkg
RaQXTR
http://ns2.solarspeed.net/downloads/RaQXTR-Sendmail-8.10.2-C1sol1.pkg
Cube3
http://ns2.solarspeed.net/downloads/Qube3-Sendmail-8.10.2-C2sol1.pkg
This PKGs fix a "Remote Header Processing Vulnerability" in Sendmail.
Attackers may remotely exploit this vulnerability to gain "root" or
superuser control of any vulnerable Sendmail server. The full details
of this vulnerability are outlined in ISS X-Force's Advisory.
The PKGs above were built with a patch that the Sendmail consortium
released to address this issue.
The Qube3, RaQ4, XTR and the RaQ550 PKG are fully uninstallable. The
RaQ3 package cannot be uninstalled.
Reboot Required: No
Sends registration email: No
On Tuesday, March 4, 2003, at 01:42 PM, Mikkel Blankholm Nielsen wrote:
How do i fix the sendmail exploit on a RaQ 3 ?
--
Mikkel Blankholm Nielsen
WicTech Internet ApS
_____________________________________
cobalt-users mailing list
cobalt-users@xxxxxxxxxxxxxxx
To subscribe/unsubscribe, or to SEARCH THE ARCHIVES, go to:
http://list.cobalt.com/mailman/listinfo/cobalt-users