version 1.8, 2003/09/17 01:02:21 |
version 1.9, 2003/09/17 15:40:13 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color="#e00000">All architectures</font></h3> |
<li><h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=sendmail4></a> |
|
<li><font color="#009000"><strong>018: SECURITY FIX: September 17, 2003</strong></font><br> |
|
A buffer overflow in the address parsing in |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sendmail&sektion=8">sendmail(8)</a> |
|
may allow an attacker to gain root privileges.<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/018_sendmail.patch">A source code patch exists which remedies the problem</a>. |
|
<p> |
<a name=sshbuffer></a> |
<a name=sshbuffer></a> |
<li><font color="#009000"><strong>017: SECURITY FIX: September 16, 2003</strong></font><br> |
<li><font color="#009000"><strong>017: SECURITY FIX: September 16, 2003</strong></font><br> |
All versions of OpenSSH's sshd prior to 3.7 contain a buffer management error. |
All versions of OpenSSH's sshd prior to 3.7 contain a buffer management error. |
It is unclear whether or not this bug is exploitable. |
It is unclear whether or not this bug is exploitable.<br> |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/017_sshbuffer.patch">A |
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/017_sshbuffer.patch">A |
source code patch exists which remedies the problem</a>. |
source code patch exists which remedies the problem</a>.<br> |
NOTE: this is the <em>second</em> revision of the patch that fixes an additional |
NOTE: this is the <em>second</em> revision of the patch that fixes an additional |
problem. |
problem. |
<p> |
<p> |