lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu Jun 15 09:14:28 2006 From: 3APA3A at SECURITY.NNOV.RU (3APA3A) Subject: [ MDKSA-2006:104 ] - Updated sendmail packages fix remotely exploitable vulnerability Dear security@...driva.com, smc> References: smc> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173 Description Unspecified vulnerability in HP Tru64 UNIX 4.0F PK8 up to 5.1B-3 and HP Internet Express for Tru64 UNIX 6.3 through 6.5, when running Sendmail, might allow remote attackers to cause a denial of service or execute arbitrary code. NOTE: as of 20060607, due to the lack of details, it is not publicly known whether this issue is within Sendmail itself, and/or if it is specific to HP. smc> http://www.cert.org/advisories/146718 Error 404. www.sendmail.org Recent News * Sendmail 8.13.7 is available (2006-06-14); it contains a fix for a potential denial of service problem caused by excessive recursion which leads to stack exhaustion when attempting delivery of a malformed MIME message. Does Somebody have details? -- ~/ZARAZA http://www.security.nnov.ru/
Powered by blists - more mailing lists