<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: sendmail 8.11.1 in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-8-11-1/m-p/3049494#M136246</link>
    <description>Unless you have very specific features enabled in sendmail, I think it's interesting that you consider changing your mail system to Postfix. It's absolutely safer than sendmail, understands sendmail's configuration files and is faster and lighter than sendmail.&lt;BR /&gt;&lt;BR /&gt;The link for Postfix is &lt;A href="http://www.postfix.org." target="_blank"&gt;http://www.postfix.org.&lt;/A&gt; Binaries for HP-UX and other information can be found at &lt;A href="http://www.stahl.bau.tu-bs.de/~hildeb/postfix." target="_blank"&gt;http://www.stahl.bau.tu-bs.de/~hildeb/postfix.&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;Paulo Fessel</description>
    <pubDate>Fri, 15 Aug 2003 13:09:18 GMT</pubDate>
    <dc:creator>Paulo A G Fessel</dc:creator>
    <dc:date>2003-08-15T13:09:18Z</dc:date>
    <item>
      <title>sendmail 8.11.1</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-8-11-1/m-p/3049493#M136245</link>
      <description>Hi, (op sys ux 11.00)&lt;BR /&gt;Have upgraded to sendmail 8.11.1.  but appear still to be vulnerable to the remote buffer overflow problem.   Have the following patches loaded:  PHKL_18799 PHNE_17190 PHNE_24419 PHNE_26304 AND SMAIL-811.  Am I still missing something?&lt;BR /&gt;Also, is there a way to disable the use of smrsh in sendmail?&lt;BR /&gt;&lt;BR /&gt;Thanks,  Maria.</description>
      <pubDate>Fri, 15 Aug 2003 00:13:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-8-11-1/m-p/3049493#M136245</guid>
      <dc:creator>Peter Gillis</dc:creator>
      <dc:date>2003-08-15T00:13:40Z</dc:date>
    </item>
    <item>
      <title>Re: sendmail 8.11.1</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-8-11-1/m-p/3049494#M136246</link>
      <description>Unless you have very specific features enabled in sendmail, I think it's interesting that you consider changing your mail system to Postfix. It's absolutely safer than sendmail, understands sendmail's configuration files and is faster and lighter than sendmail.&lt;BR /&gt;&lt;BR /&gt;The link for Postfix is &lt;A href="http://www.postfix.org." target="_blank"&gt;http://www.postfix.org.&lt;/A&gt; Binaries for HP-UX and other information can be found at &lt;A href="http://www.stahl.bau.tu-bs.de/~hildeb/postfix." target="_blank"&gt;http://www.stahl.bau.tu-bs.de/~hildeb/postfix.&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;Paulo Fessel</description>
      <pubDate>Fri, 15 Aug 2003 13:09:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-8-11-1/m-p/3049494#M136246</guid>
      <dc:creator>Paulo A G Fessel</dc:creator>
      <dc:date>2003-08-15T13:09:18Z</dc:date>
    </item>
    <item>
      <title>Re: sendmail 8.11.1</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-8-11-1/m-p/3049495#M136247</link>
      <description>Go here:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.software.hp.com/ISS_products_list.html" target="_blank"&gt;http://www.software.hp.com/ISS_products_list.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;And download security_patch_check and run it once a week or so. Be sure to always run it with the -r option to refresh the catalog.&lt;BR /&gt;&lt;BR /&gt;mark</description>
      <pubDate>Fri, 15 Aug 2003 14:32:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-8-11-1/m-p/3049495#M136247</guid>
      <dc:creator>Mark Greene_1</dc:creator>
      <dc:date>2003-08-15T14:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: sendmail 8.11.1</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-8-11-1/m-p/3049496#M136248</link>
      <description>SMRSH IN SENDMAIL&lt;BR /&gt;If Sendmail is using smrsh, then the only programs that can be executed are those under the /etc/smrsh/ directory. Perhaps the best solution to run the wrapper from the aliases file is to create a symbolic link from /etc/smrsh/wrapper to /usr/local/majordomo-1.94.5/wrapper. [root@kes smrsh]# ln -s /usr/local/majordomo-1.94.5/wrapper wrapper&lt;BR /&gt; &lt;BR /&gt;A second solution is to actually move the wrapper into the /etc/smrsh/ directory. [root@kes smrsh]# mv /usr/local/majordomo-1.94.5/wrapper ./&lt;BR /&gt; &lt;BR /&gt;If security is not a major concern, the secure shell can be disabled. One fairly crude method is simply to delete /usr/sbin/smrsh and copy or link /bin/sh in its place. [root@kes sbin]# rm -f smrsh&lt;BR /&gt;[root@kes sbin]# ln -s /bin/sh smrsh&lt;BR /&gt; &lt;BR /&gt;A better (but more difficult) method is to edit sendmail.cf. Change the reference from /usr/sbin/smrsh Mprog,  P=/usr/sbin/smrsh, F=lsDFMoqeu9, S=10/30, R=20/40, D=$z:/,&lt;BR /&gt;  T=X-Unix,&lt;BR /&gt;  A=sh -c $u&lt;BR /&gt; &lt;BR /&gt;to /bin/sh Mprog,  P=/bin/sh, F=lsDFMoqeu9, S=10/30, R=20/40, D=$z:/,&lt;BR /&gt;  T=X-Unix,&lt;BR /&gt;  A=sh -c $u&lt;BR /&gt; &lt;BR /&gt;&lt;BR /&gt;Advantage:  This will prevent this class of vulnerability being &lt;BR /&gt; exploited on your system without requiring a new version of&lt;BR /&gt; sendmail(8) to be installed.  Mailing to unauthorised programs&lt;BR /&gt; will no longer work.&lt;BR /&gt;    Disadvantage:  If a program is not authorised by smrsh, any attempt&lt;BR /&gt; to use it via mail will cause an error reply to be generated.&lt;BR /&gt; System administrators should check their aliases and all &lt;BR /&gt; .forward files for any configuration that mails to a program. &lt;BR /&gt; These configurations will generate an error reply on every &lt;BR /&gt; message mailed if that program is not authorised for use by smrsh.&lt;BR /&gt; If the .forward file contains something similar to:&lt;BR /&gt;  \user, "| /usr/ucb/vacation user"&lt;BR /&gt; then mail will still be delivered to "user", but an error reply&lt;BR /&gt; (not the vacation message) will be returned to the sender if&lt;BR /&gt; vacation is not authorised for use by smrsh.&lt;BR /&gt;</description>
      <pubDate>Fri, 15 Aug 2003 14:48:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-8-11-1/m-p/3049496#M136248</guid>
      <dc:creator>Jairo Campana</dc:creator>
      <dc:date>2003-08-15T14:48:15Z</dc:date>
    </item>
  </channel>
</rss>

