lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <200303042132.47407.d.huecking@gmx.net>
Date: Tue, 4 Mar 2003 21:32:47 +0100
From: David Huecking <d.huecking@....net>
To: bugtraq@...urityfocus.com
Subject: Re: Sendmail testing tool.


Seen on 
http://www.sendmail.org/patchcr.html

To check whether the new sendmail binary contains the patch, run this command 
(in the directory where the binary is located): 

strings sendmail | grep 'Dropped invalid comments from header address'

 The command must print the string 
Dropped invalid comments from header address


On Dienstag, 4. März 2003 00:34, Jon Larabee wrote:
> Sorry for my ignorance as I have just patched sendmail for the currently
> new vunerability in 8.12.7 and below. Is there a test tool yet so that I
> could verify that the patch took and that the exploit has been taken care
> of? 

-- 
Eat, sleep and go running,
David Huecking.

Encrypted eMail welcome! 
GnuPG/ PGP-Key: 0x57809216. Fingerprint: 
3DF2 CBE0 DFAA 4164 02C2  4E2A E005 8DF7 5780 9216



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ