웹마스터 팁
page_full_width">
센드메일 에라타..
2003.04.01 16:23
지금 시간부로 레드햇 에라타에 떴군요.
아주 요즘은 에라타 홍수인듯. certcc에서는 어제 날짜로 발표되었습니다.
센드메일 사용하시는 분들은 패치 하세요.
덕분에 레드햇 9도 업데이트가 되는군요.. -.-;
--- 내용 --
Red Hat Network has determined that the following advisory is applicable to
one or more of the systems you have registered:
Complete information about this errata can be found at the following location:
https://rhn.redhat.com/network/errata/errata_details.pxt?eid=1565
Security Advisory - RHSA-2003:120-07
------------------------------------------------------------------------------
Summary:
Updated sendmail packages fix vulnerability
Updated Sendmail packages are available to fix a vulnerability that
allows local and possibly remote attackers to gain root privileges.
Description:
Sendmail is a widely used Mail Transport Agent (MTA) which is included
in all Red Hat Linux distributions.
There is a vulnerability in Sendmail versions prior to and including
8.12.8. The address parser performs insufficient bounds checking in certain
conditions due to a char to int conversion, making it possible for an
attacker to take control of the application. Although no exploit currently
exists, this issue is probably locally exploitable and may also be remotely
exploitable.
All users are advised to update to these erratum packages containing a
backported patch which corrects these vulnerabilities.
Red Hat would like to thank Michal Zalewski for finding and reporting this
issue.
------------------------------------------------------------------------------
-------------
Taking Action
-------------
You may address the issues outlined in this advisory in two ways:
- select your server name by clicking on its name from the list
available at the following location, and then schedule an
errata update for it:
https://rhn.redhat.com/network/systemlist/system_list.pxt
- run the Update Agent on each affected server.
아주 요즘은 에라타 홍수인듯. certcc에서는 어제 날짜로 발표되었습니다.
센드메일 사용하시는 분들은 패치 하세요.
덕분에 레드햇 9도 업데이트가 되는군요.. -.-;
--- 내용 --
Red Hat Network has determined that the following advisory is applicable to
one or more of the systems you have registered:
Complete information about this errata can be found at the following location:
https://rhn.redhat.com/network/errata/errata_details.pxt?eid=1565
Security Advisory - RHSA-2003:120-07
------------------------------------------------------------------------------
Summary:
Updated sendmail packages fix vulnerability
Updated Sendmail packages are available to fix a vulnerability that
allows local and possibly remote attackers to gain root privileges.
Description:
Sendmail is a widely used Mail Transport Agent (MTA) which is included
in all Red Hat Linux distributions.
There is a vulnerability in Sendmail versions prior to and including
8.12.8. The address parser performs insufficient bounds checking in certain
conditions due to a char to int conversion, making it possible for an
attacker to take control of the application. Although no exploit currently
exists, this issue is probably locally exploitable and may also be remotely
exploitable.
All users are advised to update to these erratum packages containing a
backported patch which corrects these vulnerabilities.
Red Hat would like to thank Michal Zalewski for finding and reporting this
issue.
------------------------------------------------------------------------------
-------------
Taking Action
-------------
You may address the issues outlined in this advisory in two ways:
- select your server name by clicking on its name from the list
available at the following location, and then schedule an
errata update for it:
https://rhn.redhat.com/network/systemlist/system_list.pxt
- run the Update Agent on each affected server.
댓글 0
제목 | 글쓴이 | 날짜 |
---|---|---|
커널에러 복구 하기~~~ [5] | 서인구 | 2003.05.11 |
윈도2000 서버에서 DNS 서버 운영하기
![]() | DearMai | 2003.05.10 |
apache 98 % 활용하기 ! (윈도우버젼) [13] | 이성헌 | 2003.05.09 |
DNS서버 만들기 [4] | 제르디스™ | 2003.05.04 |
NSLOOKUP 으로 서브도메인과 메일서버 알아보기 [6] | 환군+ | 2003.05.02 |
MASQUERADE 클라이언트 IP 자동으로 부여해주기 [1] | 엔포게이트 | 2003.05.01 |
MASQUERADE 클라이언트 컴퓨터 인터넷 되게..^^; [4] | 김도진 | 2003.04.25 |
APM_Setup4에서 CGI 쉽게 설치하기 [3] | RedEye | 2003.04.14 |
(더 성공률 높은)Apache에서 ASP돌리기(초간다안!!) [6] | okw1003 | 2003.04.09 |
mysqldump를 이용해서 원하는 조건의 record만 뽑아내기 [2] | 겨울늑대 | 2003.04.08 |
mysql DB 주기적 자동 백업 하기 [8] | 김령현 | 2003.04.04 |
md5 암호화 알고리즘을 488bit blf 알고리즘으로 바꾸기 [17] | 김령현 | 2003.04.04 |
센드메일 에라타.. | 선장 | 2003.04.01 |
특정 유저만 su root 허용 | 군고구마 | 2003.04.01 |
서버의 아파치보안 테스트 해보세요 [12] | 김령현 | 2003.03.26 |
file 명령어의 취약성 [1] | DearMai | 2003.03.25 |
무선랜 솔루션에 대해서. 저도^^; | Dopesoul | 2003.03.21 |
무선 네트웍 구성. [2] | 지니 | 2003.03.21 |
커널 2.4 local ptrace-related vulnerability 패치하세요~ [8] | 김도한 | 2003.03.20 |
mysql에서 사용자 권한을 잘못 부여하여 root로 접속불가, 사용권한 제한등 문제 해결방법 [3] | 정종화 | 2003.03.20 |