version 1.2, 2003/03/31 00:47:54 |
version 1.3, 2003/03/31 09:05:09 |
|
|
<a name=all></a> |
<a name=all></a> |
<li><h3><font color="#e00000">All architectures</font></h3> |
<li><h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
|
<a name=sendmail2></a> |
|
<li><font color="#009000"><strong>014: SECURITY FIX: March 31, 2003</strong></font><br> |
|
A buffer overflow in the address parsing in |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sendmail&sektion=8">sendmail(8)</a> |
|
may allow an attacker to gain root privileges.<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/014_sendmail.patch">A |
|
source code patch exists which remedies the problem</a>. |
|
<p> |
<a name=kerberos></a> |
<a name=kerberos></a> |
<li><font color="#009000"><strong>013: SECURITY FIX: March 24, 2003</strong></font><br> |
<li><font color="#009000"><strong>013: SECURITY FIX: March 24, 2003</strong></font><br> |
A cryptographic weaknesses in the Kerberos v4 protocol can be exploited |
A cryptographic weaknesses in the Kerberos v4 protocol can be exploited |