[BACK]Return to errata32.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/errata32.html between version 1.2 and 1.3

version 1.2, 2003/03/31 00:47:54 version 1.3, 2003/03/31 09:05:09
Line 54 
Line 54 
 <a name=all></a>  <a name=all></a>
 <li><h3><font color="#e00000">All architectures</font></h3>  <li><h3><font color="#e00000">All architectures</font></h3>
 <ul>  <ul>
   <a name=sendmail2></a>
   <li><font color="#009000"><strong>014: SECURITY FIX: March 31, 2003</strong></font><br>
   A buffer overflow in the address parsing in
   <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=sendmail&amp;sektion=8">sendmail(8)</a>
   may allow an attacker to gain root privileges.<br>
   <a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/014_sendmail.patch">A
   source code patch exists which remedies the problem</a>.
   <p>
 <a name=kerberos></a>  <a name=kerberos></a>
 <li><font color="#009000"><strong>013: SECURITY FIX: March 24, 2003</strong></font><br>  <li><font color="#009000"><strong>013: SECURITY FIX: March 24, 2003</strong></font><br>
 A cryptographic weaknesses in the Kerberos v4 protocol can be exploited  A cryptographic weaknesses in the Kerberos v4 protocol can be exploited

Legend:
Removed from v.1.2  
changed lines
  Added in v.1.3