<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Verifying Sendmail Patch Level in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/verifying-sendmail-patch-level/m-p/3050953#M136522</link>
    <description>Gus,&lt;BR /&gt;&lt;BR /&gt;There was some discussion after the initial announcement of the vulnerabilities and the associated fix about how to tell if your version was OK:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x5c669c196a4bd71190080090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x5c669c196a4bd71190080090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Pete&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Mon, 18 Aug 2003 13:38:46 GMT</pubDate>
    <dc:creator>Pete Randall</dc:creator>
    <dc:date>2003-08-18T13:38:46Z</dc:date>
    <item>
      <title>Verifying Sendmail Patch Level</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/verifying-sendmail-patch-level/m-p/3050951#M136520</link>
      <description>Hello all,&lt;BR /&gt;Is there a foolproof way to determine whether a version of Sendmail is fully patched? I'm fairly certain I applied the "manual updates" in March and April 2003 when several vulnerabilities were published, but how can I be sure?  How can I convince the IS department around here that I am protected against various specific exploits? (Namely, remote buffer overflows, DNS handling overflow, smrsh error, "-bt overflow attack", local buffer overlow, etc...the list goes on).&lt;BR /&gt;&lt;BR /&gt;I am running HP-UX 11.0 on a J5600 workstation.  Telnetting to port 25 shows 8.11.1/8.11.1.  The date of /usr/contrib/sendmail/usr/sbin/sendmail is April 4, 2003.  Even if I were to download the July 2003 "special release" version from software.hp.com, how can I know for certain that the above vulnerabilities have been patched?&lt;BR /&gt;&lt;BR /&gt;Thanks for any assistance,&lt;BR /&gt;Gus</description>
      <pubDate>Mon, 18 Aug 2003 13:31:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/verifying-sendmail-patch-level/m-p/3050951#M136520</guid>
      <dc:creator>Gus Larsson</dc:creator>
      <dc:date>2003-08-18T13:31:32Z</dc:date>
    </item>
    <item>
      <title>Re: Verifying Sendmail Patch Level</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/verifying-sendmail-patch-level/m-p/3050952#M136521</link>
      <description>swlist -l product |grep -i sendmail&lt;BR /&gt;&lt;BR /&gt;It will show all patches.&lt;BR /&gt;&lt;BR /&gt;To do more, you are going to have to download some hacking instructions(I will not post that stuff here) and demonstrate to your management/auditors that you can withstand attack.&lt;BR /&gt;&lt;BR /&gt;You also might want to set up httpd and dns in a chroot jail where users other than root start and own the daemons.&lt;BR /&gt;&lt;BR /&gt;The best way to keep up is to get itrc security updates, and watch here for posts by Berlene Herren, she posts the warnings for HP the minute they are ready.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 18 Aug 2003 13:36:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/verifying-sendmail-patch-level/m-p/3050952#M136521</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-08-18T13:36:02Z</dc:date>
    </item>
    <item>
      <title>Re: Verifying Sendmail Patch Level</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/verifying-sendmail-patch-level/m-p/3050953#M136522</link>
      <description>Gus,&lt;BR /&gt;&lt;BR /&gt;There was some discussion after the initial announcement of the vulnerabilities and the associated fix about how to tell if your version was OK:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x5c669c196a4bd71190080090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x5c669c196a4bd71190080090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Pete&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 18 Aug 2003 13:38:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/verifying-sendmail-patch-level/m-p/3050953#M136522</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2003-08-18T13:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: Verifying Sendmail Patch Level</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/verifying-sendmail-patch-level/m-p/3050954#M136523</link>
      <description>what /usr/sbin/sendmail&lt;BR /&gt;&lt;BR /&gt;  Massimo</description>
      <pubDate>Mon, 18 Aug 2003 13:40:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/verifying-sendmail-patch-level/m-p/3050954#M136523</guid>
      <dc:creator>Massimo Bianchi</dc:creator>
      <dc:date>2003-08-18T13:40:28Z</dc:date>
    </item>
    <item>
      <title>Re: Verifying Sendmail Patch Level</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/verifying-sendmail-patch-level/m-p/3050955#M136524</link>
      <description>Thanks for the replys. I'm not sure that any of the proposed methods will prove to the corporate IT folks that my version is not vulnerable, but at least the "what /usr/sbin/sendmail" shows a revision number. That way at least I'll be assured that I am protected, and I'll be able to evaluate my other systems similarly.  &lt;BR /&gt;&lt;BR /&gt;BTW, I don't see any of that "JAG" stuff when I run the "what ...sendmail" command, even though I just loaded the July 2003 special release. Here is what I get:&lt;BR /&gt;&lt;BR /&gt;/etc/mail&amp;gt; what /usr/sbin/sendmail    &lt;BR /&gt;/usr/sbin/sendmail:&lt;BR /&gt;         Copyright (c) 1998 HEWLETT PACKARD COMPANY and its licensors,&lt;BR /&gt;             including Sendmail, Inc., and the Regents of the&lt;BR /&gt;             University of California.  All rights reserved.&lt;BR /&gt;        version.c  8.11.1 (Berkeley) - Revision 1.4 - 2003/05/05 &lt;BR /&gt;&lt;BR /&gt;I guess that maybe the JAG identifier (?) isn't included in all releases.&lt;BR /&gt;&lt;BR /&gt;Gus</description>
      <pubDate>Mon, 18 Aug 2003 14:51:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/verifying-sendmail-patch-level/m-p/3050955#M136524</guid>
      <dc:creator>Gus Larsson</dc:creator>
      <dc:date>2003-08-18T14:51:17Z</dc:date>
    </item>
    <item>
      <title>Re: Verifying Sendmail Patch Level</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/verifying-sendmail-patch-level/m-p/3050956#M136525</link>
      <description>Try this:&lt;BR /&gt;&lt;BR /&gt;echo \$Z | /usr/sbin/sendmail -bt -d&lt;BR /&gt;&lt;BR /&gt;Rgds...Geoff</description>
      <pubDate>Tue, 19 Aug 2003 18:17:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/verifying-sendmail-patch-level/m-p/3050956#M136525</guid>
      <dc:creator>Geoff Wild</dc:creator>
      <dc:date>2003-08-19T18:17:17Z</dc:date>
    </item>
  </channel>
</rss>

