SOT Linux Advisory: sendmailSep 18, 2003, 15:59 (1 Talkback[s])
WEBINAR: On-demand Event
Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >
SOT Linux Security Advisory
1. Problem description
Sendmail is a widely used Mail Transport Agent (MTA).
There is a vulnerability in Sendmail versions prior to and including 8.12.9. Michal Zalewski discovered a buffer overflow in address parsing, patch from Todd C. Miller of Courtesan Consulting.
All users are advised to update to these erratum packages containing a backported patch which corrects these vulnerabilities.
2. Updated packages
SOT Linux 2003 Desktop:
SOT Linux 2003 Server:
3. Upgrading package
Before applying this update, make sure all previously released errata relevant to your system have been applied.
Use up2date to automatically upgrade the fixed packages.
If you want to upgrade manually, download the updated package from the SOT Linux FTP site (use the links above) or from one of our mirrors. The list of mirrors can be obtained at www.sot.com/en/linux
Update the package with the following command: rpm -Uvh <filename>
All packages are PGP signed by SOT for security.
You can verify each package with the following command: rpm --checksig <filename>
If you wish to verify the integrity of the downloaded package, run "md5sum <filename>" and compare the output with data given below.
Package Name MD5 sum
Copyright(c) 2001-2003 SOT
0 Talkback[s] (click to add your comment)