version 1.558, 2006/06/16 00:15:30 |
version 1.559, 2006/07/30 17:35:57 |
|
|
<a name="vax"></a> |
<a name="vax"></a> |
<ul> |
<ul> |
|
|
|
<li><a name="httpd"></a> |
|
<font color="#009000"><strong>004: SECURITY FIX: July 30, 2006</strong></font> <i>All architectures</i><br> |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&apropos=0&sektion=8&manpath=OpenBSD+Current&arch=i386&format=html">httpd(8)</a> |
|
's mod_rewrite has a potentially exploitable off-by-one buffer overflow. |
|
The buffer overflow may result in a vulnerability which, in combination |
|
with certain types of Rewrite rules in the web server configuration files, |
|
could be triggered remotely. The default install is not affected by the |
|
buffer overflow. CVE-2006-3747 |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/004_httpd.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
|
|
<li><a name="sendmail2"></a> |
<li><a name="sendmail2"></a> |
<font color="#009000"><strong>003: SECURITY FIX: June 15, 2006</strong></font> <i>All architectures</i><br> |
<font color="#009000"><strong>003: SECURITY FIX: June 15, 2006</strong></font> <i>All architectures</i><br> |
A potential denial of service problem has been found in sendmail. A malformed MIME |
A potential denial of service problem has been found in sendmail. A malformed MIME |