Hello Frederik,

Tuesday, March 4, 2003, 11:28:10 AM, you wrote:


FG> To Whom It May Concern ...

FG> ---
FG> CERT Advisory CA-2003-07 Remote Buffer Overflow in Sendmail

FG>    Original release date: March 3, 2003
FG>    Last revised: --
FG>    Source: CERT/CC

FG>    A complete revision history can be found at the end of this file.

FG> Systems Affected

FG>      * Sendmail Pro (all versions)
FG>      * Sendmail Switch 2.1 prior to 2.1.5
FG>      * Sendmail Switch 2.2 prior to 2.2.5
FG>      * Sendmail Switch 3.0 prior to 3.0.3
FG>      * Sendmail for NT 2.X prior to 2.6.2
FG>      * Sendmail for NT 3.0 prior to 3.0.3
FG>      * Systems  running  open-source  sendmail  versions prior to 8.12.8,
FG>        including UNIX and Linux systems

FG> Overview

FG>    There  is  a vulnerability in sendmail that may allow remote attackers
FG>    to gain the privileges of the sendmail daemon, typically root.


This advisory only corresponds to Sendmail MTA. XMail is another
MTA that do not contain this vulnerability (i hope :))


-- 
Best regards,
 pinhead                            mailto:[EMAIL PROTECTED]

-
To unsubscribe from this list: send the line "unsubscribe xmail" in
the body of a message to [EMAIL PROTECTED]
For general help: send the line "help" in the body of a message to
[EMAIL PROTECTED]

Reply via email to