lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <406982343.20060615121413@SECURITY.NNOV.RU>
Date: Thu Jun 15 09:14:28 2006
From: 3APA3A at SECURITY.NNOV.RU (3APA3A)
Subject: [ MDKSA-2006:104 ] - Updated sendmail packages
	fix remotely exploitable vulnerability

Dear security@...driva.com,

smc>  References:
 
smc>  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1173

Description  Unspecified  vulnerability  in HP Tru64 UNIX 4.0F PK8 up to
5.1B-3  and  HP  Internet  Express  for Tru64 UNIX 6.3 through 6.5, when
running  Sendmail,  might  allow  remote  attackers to cause a denial of
service or execute arbitrary code. NOTE: as of 20060607, due to the lack
of  details,  it  is  not  publicly  known  whether this issue is within
Sendmail itself, and/or if it is specific to HP.

smc>  http://www.cert.org/advisories/146718

Error 404.

www.sendmail.org

Recent News

    * Sendmail 8.13.7 is available (2006-06-14); it contains a fix for a potential denial of service problem caused by excessive recursion which leads to stack exhaustion when attempting delivery of a malformed MIME message.

    Does Somebody have details?

-- 
~/ZARAZA
http://www.security.nnov.ru/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ