OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-web                      Date:   04-Mar-2003 16:07:00
  Branch: HEAD                             Handle: 2003030415070000

  Modified files:
    openpkg-web/security    OpenPKG-SA-2003.016-sendmail.txt

  Log:
    bugfix and cleanup

  Summary:
    Revision    Changes     Path
    1.2         +9  -9      openpkg-web/security/OpenPKG-SA-2003.016-sendmail.txt
  ____________________________________________________________________________

  patch -p0 <<'@@ .'
  Index: openpkg-web/security/OpenPKG-SA-2003.016-sendmail.txt
  ============================================================================
  $ cvs diff -u -r1.1 -r1.2 OpenPKG-SA-2003.016-sendmail.txt
  --- openpkg-web/security/OpenPKG-SA-2003.016-sendmail.txt     4 Mar 2003 13:06:11 
-0000       1.1
  +++ openpkg-web/security/OpenPKG-SA-2003.016-sendmail.txt     4 Mar 2003 15:07:00 
-0000       1.2
  @@ -12,18 +12,18 @@
   
   Affected Releases:   Affected Packages:          Corrected Packages:
   OpenPKG CURRENT      <= sendmail-8.12.7-20030205 >= sendmail-8.12.8-20030304
  -OpenPKG 1.2          <= sendmail-8.12.7-1.2.0    >= sendmail-8.12.4-1.2.1
  +OpenPKG 1.2          <= sendmail-8.12.7-1.2.0    >= sendmail-8.12.7-1.2.1
   OpenPKG 1.1          none                        N.A.
   
   Dependent Packages:  none
   
   Description:
  -  According to a ISS X-Force [0], a buffer overflow vulnerability
  -  exists in all sendmail versions from 5.79 to 8.12.7 [1]. Attackers
  -  may remotely exploit this vulnerability to gain "root" or superuser
  -  control of any vulnerable Sendmail server. The Common Vulnerabilities
  -  and Exposures (CVE) project assigned the id CAN-2002-1337 [2] to the
  -  problem.
  +  According to an ISS X-Force advisory [1], a buffer overflow
  +  vulnerability exists in all versions from 5.79 to 8.12.7 of the
  +  Sendmail MTA [0]. Attackers may remotely exploit this vulnerability to
  +  gain "root" or superuser control of any vulnerable Sendmail server.
  +  The Common Vulnerabilities and Exposures (CVE) project assigned the id
  +  CAN-2002-1337 [2] to the problem.
   
     Please check whether you are affected by running "<prefix>/bin/rpm
     -q sendmail". If you have the "sendmail" package installed and its
  @@ -52,8 +52,8 @@
   ________________________________________________________________________
   
   References:
  -  [0] http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950
  -  [1] http://www.sendmail.org/
  +  [0] http://www.sendmail.org/
  +  [1] http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950
     [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1337
     [3] http://www.openpkg.org/tutorial.html#regular-source
     [4] http://www.openpkg.org/tutorial.html#regular-binary
  @@ .
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to