To Whom It May Concern ...
---
CERT Advisory CA-2003-07 Remote Buffer Overflow in Sendmail
Original release date: March 3, 2003
Last revised: --
Source: CERT/CC
A complete revision history can be found at the end of this file.
Systems Affected
* Sendmail Pro (all versions)
* Sendmail Switch 2.1 prior to 2.1.5
* Sendmail Switch 2.2 prior to 2.2.5
* Sendmail Switch 3.0 prior to 3.0.3
* Sendmail for NT 2.X prior to 2.6.2
* Sendmail for NT 3.0 prior to 3.0.3
* Systems running open-source sendmail versions prior to 8.12.8,
including UNIX and Linux systems
Overview
There is a vulnerability in sendmail that may allow remote attackers
to gain the privileges of the sendmail daemon, typically root.
Read on at: http://www.kb.cert.org/vuls/id/398025
-
To unsubscribe from this list: send the line "unsubscribe xmail" in
the body of a message to [EMAIL PROTECTED]
For general help: send the line "help" in the body of a message to
[EMAIL PROTECTED]