[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [cobalt-users] Sendmail bug fix.



For RaQ3
http://ns2.solarspeed.net/downloads/RaQ3-Sendmail-8.9.3C7sol1.pkg

For RaQ4
http://ns2.solarspeed.net/downloads/RaQ4-Sendmail-8.10.2-C1sol1.pkg

For RaQ550
http://ns2.solarspeed.net/downloads/RaQ550-Sendmail-8.11.6-1C4sol1.pkg

RaQXTR
http://ns2.solarspeed.net/downloads/RaQXTR-Sendmail-8.10.2-C1sol1.pkg

Cube3
http://ns2.solarspeed.net/downloads/Qube3-Sendmail-8.10.2-C2sol1.pkg

This PKGs fix a "Remote Header Processing Vulnerability" in Sendmail. Attackers may remotely exploit this vulnerability to gain "root" or superuser control of any vulnerable Sendmail server. The full details of this vulnerability are outlined in ISS X-Force's Advisory.

The PKGs above were built with a patch that the Sendmail consortium released to address this issue.

The Qube3, RaQ4, XTR and the RaQ550 PKG are fully uninstallable. The RaQ3 package cannot be uninstalled.

Reboot Required: No
Sends registration email: No

On Tuesday, March 4, 2003, at 01:42 PM, Mikkel Blankholm Nielsen wrote:

How do i fix the sendmail exploit on a RaQ 3 ?

--
Mikkel Blankholm Nielsen
WicTech Internet ApS



_____________________________________
cobalt-users mailing list
cobalt-users@xxxxxxxxxxxxxxx
To subscribe/unsubscribe, or to SEARCH THE ARCHIVES, go to:
http://list.cobalt.com/mailman/listinfo/cobalt-users