Hello Frederik, Tuesday, March 4, 2003, 11:28:10 AM, you wrote:
FG> To Whom It May Concern ... FG> --- FG> CERT Advisory CA-2003-07 Remote Buffer Overflow in Sendmail FG> Original release date: March 3, 2003 FG> Last revised: -- FG> Source: CERT/CC FG> A complete revision history can be found at the end of this file. FG> Systems Affected FG> * Sendmail Pro (all versions) FG> * Sendmail Switch 2.1 prior to 2.1.5 FG> * Sendmail Switch 2.2 prior to 2.2.5 FG> * Sendmail Switch 3.0 prior to 3.0.3 FG> * Sendmail for NT 2.X prior to 2.6.2 FG> * Sendmail for NT 3.0 prior to 3.0.3 FG> * Systems running open-source sendmail versions prior to 8.12.8, FG> including UNIX and Linux systems FG> Overview FG> There is a vulnerability in sendmail that may allow remote attackers FG> to gain the privileges of the sendmail daemon, typically root. This advisory only corresponds to Sendmail MTA. XMail is another MTA that do not contain this vulnerability (i hope :)) -- Best regards, pinhead mailto:[EMAIL PROTECTED] - To unsubscribe from this list: send the line "unsubscribe xmail" in the body of a message to [EMAIL PROTECTED] For general help: send the line "help" in the body of a message to [EMAIL PROTECTED]
