웹마스터 팁
page_full_width" class="col-xs-12" |cond="$__Context->page_full_width">
센드메일 에라타..
2003.04.01 16:23
지금 시간부로 레드햇 에라타에 떴군요.
아주 요즘은 에라타 홍수인듯. certcc에서는 어제 날짜로 발표되었습니다.
센드메일 사용하시는 분들은 패치 하세요.
덕분에 레드햇 9도 업데이트가 되는군요.. -.-;
--- 내용 --
Red Hat Network has determined that the following advisory is applicable to
one or more of the systems you have registered:
Complete information about this errata can be found at the following location:
https://rhn.redhat.com/network/errata/errata_details.pxt?eid=1565
Security Advisory - RHSA-2003:120-07
------------------------------------------------------------------------------
Summary:
Updated sendmail packages fix vulnerability
Updated Sendmail packages are available to fix a vulnerability that
allows local and possibly remote attackers to gain root privileges.
Description:
Sendmail is a widely used Mail Transport Agent (MTA) which is included
in all Red Hat Linux distributions.
There is a vulnerability in Sendmail versions prior to and including
8.12.8. The address parser performs insufficient bounds checking in certain
conditions due to a char to int conversion, making it possible for an
attacker to take control of the application. Although no exploit currently
exists, this issue is probably locally exploitable and may also be remotely
exploitable.
All users are advised to update to these erratum packages containing a
backported patch which corrects these vulnerabilities.
Red Hat would like to thank Michal Zalewski for finding and reporting this
issue.
------------------------------------------------------------------------------
-------------
Taking Action
-------------
You may address the issues outlined in this advisory in two ways:
- select your server name by clicking on its name from the list
available at the following location, and then schedule an
errata update for it:
https://rhn.redhat.com/network/systemlist/system_list.pxt
- run the Update Agent on each affected server.
아주 요즘은 에라타 홍수인듯. certcc에서는 어제 날짜로 발표되었습니다.
센드메일 사용하시는 분들은 패치 하세요.
덕분에 레드햇 9도 업데이트가 되는군요.. -.-;
--- 내용 --
Red Hat Network has determined that the following advisory is applicable to
one or more of the systems you have registered:
Complete information about this errata can be found at the following location:
https://rhn.redhat.com/network/errata/errata_details.pxt?eid=1565
Security Advisory - RHSA-2003:120-07
------------------------------------------------------------------------------
Summary:
Updated sendmail packages fix vulnerability
Updated Sendmail packages are available to fix a vulnerability that
allows local and possibly remote attackers to gain root privileges.
Description:
Sendmail is a widely used Mail Transport Agent (MTA) which is included
in all Red Hat Linux distributions.
There is a vulnerability in Sendmail versions prior to and including
8.12.8. The address parser performs insufficient bounds checking in certain
conditions due to a char to int conversion, making it possible for an
attacker to take control of the application. Although no exploit currently
exists, this issue is probably locally exploitable and may also be remotely
exploitable.
All users are advised to update to these erratum packages containing a
backported patch which corrects these vulnerabilities.
Red Hat would like to thank Michal Zalewski for finding and reporting this
issue.
------------------------------------------------------------------------------
-------------
Taking Action
-------------
You may address the issues outlined in this advisory in two ways:
- select your server name by clicking on its name from the list
available at the following location, and then schedule an
errata update for it:
https://rhn.redhat.com/network/systemlist/system_list.pxt
- run the Update Agent on each affected server.
댓글 0
제목 | 글쓴이 | 날짜 |
---|---|---|
[진자 유용한] www 자동으로 붙여주기 [6] | Dopesoul | 2003.05.24 |
[간단팁] 윈도우즈 2003 에서 mysql 사용할때.. [5] | 오종선 | 2003.05.22 |
ie60이상버전의 개인정보기능으로 인한 서비스문제 [2] | 날파리 | 2003.05.21 |
한컴 리눅스 2.2 apach php mysql phpmyadmin zeroboard 서버구축기 예전에 쓴글 약간 수정판 입니다. [6] | 한돌 | 2003.05.19 |
IIS 5.0 WebDAV Buffer Overflow 취약점에 대한 공격빈도 증가 | DearMai | 2003.05.17 |
커널에러 복구 하기~~~ [5] | 서인구 | 2003.05.11 |
윈도2000 서버에서 DNS 서버 운영하기 | DearMai | 2003.05.10 |
apache 98 % 활용하기 ! (윈도우버젼) [13] | 이성헌 | 2003.05.09 |
DNS서버 만들기 [4] | 제르디스™ | 2003.05.04 |
NSLOOKUP 으로 서브도메인과 메일서버 알아보기 [6] | 환군+ | 2003.05.02 |
MASQUERADE 클라이언트 IP 자동으로 부여해주기 [1] | 엔포게이트 | 2003.05.01 |
MASQUERADE 클라이언트 컴퓨터 인터넷 되게..^^; [4] | 김도진 | 2003.04.25 |
APM_Setup4에서 CGI 쉽게 설치하기 [3] | RedEye | 2003.04.14 |
(더 성공률 높은)Apache에서 ASP돌리기(초간다안!!) [6] | okw1003 | 2003.04.09 |
mysqldump를 이용해서 원하는 조건의 record만 뽑아내기 [2] | 겨울늑대 | 2003.04.08 |
mysql DB 주기적 자동 백업 하기 [8] | 김령현 | 2003.04.04 |
md5 암호화 알고리즘을 488bit blf 알고리즘으로 바꾸기 [17] | 김령현 | 2003.04.04 |
센드메일 에라타.. | 선장 | 2003.04.01 |
특정 유저만 su root 허용 | 군고구마 | 2003.04.01 |
서버의 아파치보안 테스트 해보세요 [12] | 김령현 | 2003.03.26 |