<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Sendmail Vulnerability in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-vulnerability/m-p/5271411#M609387</link>
    <description>This vulnerability only applies if you have STARTTLS enabled.  I'm sending you the document so you can see exactly what the vulnerability is and decide how best to handle it.   &lt;A href="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02009860" target="_blank"&gt;http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02009860&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;This should answer all of your questions.&lt;BR /&gt;&lt;BR /&gt;Rick</description>
    <pubDate>Tue, 25 Jan 2011 14:13:02 GMT</pubDate>
    <dc:creator>RickT_1</dc:creator>
    <dc:date>2011-01-25T14:13:02Z</dc:date>
    <item>
      <title>Sendmail Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-vulnerability/m-p/5271410#M609386</link>
      <description>Hi, we have a HPUX11.31 server with SAP application running on it.&lt;BR /&gt;&lt;BR /&gt;Issue details:&lt;BR /&gt;We are using Sendmail to receive incoming mails to SAP application. We have received Security Alert for sendmail from security team.&lt;BR /&gt;&lt;BR /&gt;Alert: There is a bug in sendmail that can allow any body to send a crafted email with code that can give them root access.&lt;BR /&gt;&lt;BR /&gt;we have sendmail version 8.13.34 loaded in 11.31. &lt;BR /&gt;)#what /usr/sbin/sendmail | grep version&lt;BR /&gt;        Sendmail version 8.13.3 - Revision 1.003:: HP-UX11.31 - 8th December,2008&lt;BR /&gt;&lt;BR /&gt;)#swlist -l product | grep -i send&lt;BR /&gt;  Sendmail              C.8.13.3.4     Mail Transfer Protocol daemons and utilities&lt;BR /&gt;&lt;BR /&gt;Does this version still have this bug or do I need to update it to 8.13.3.5 as per the reference given below&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://h20392.www2.hp.com/portal/swdepot/displayInstallInfo.do?productNumber=SMAIL813" target="_blank"&gt;https://h20392.www2.hp.com/portal/swdepot/displayInstallInfo.do?productNumber=SMAIL813&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=SMAIL813" target="_blank"&gt;https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=SMAIL813&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Kindly help me with your inputs...&lt;BR /&gt;&lt;BR /&gt;Thanks in Advance.</description>
      <pubDate>Tue, 25 Jan 2011 07:51:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-vulnerability/m-p/5271410#M609386</guid>
      <dc:creator>Venkatesan_5</dc:creator>
      <dc:date>2011-01-25T07:51:05Z</dc:date>
    </item>
    <item>
      <title>Re: Sendmail Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-vulnerability/m-p/5271411#M609387</link>
      <description>This vulnerability only applies if you have STARTTLS enabled.  I'm sending you the document so you can see exactly what the vulnerability is and decide how best to handle it.   &lt;A href="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02009860" target="_blank"&gt;http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02009860&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;This should answer all of your questions.&lt;BR /&gt;&lt;BR /&gt;Rick</description>
      <pubDate>Tue, 25 Jan 2011 14:13:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-vulnerability/m-p/5271411#M609387</guid>
      <dc:creator>RickT_1</dc:creator>
      <dc:date>2011-01-25T14:13:02Z</dc:date>
    </item>
    <item>
      <title>Re: Sendmail Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-vulnerability/m-p/5271412#M609388</link>
      <description>There was a fix done around mid-2010.  Version 8.13.3.4.1.&lt;BR /&gt;So anything from this version...on will have the fix.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Rita</description>
      <pubDate>Tue, 25 Jan 2011 14:13:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-vulnerability/m-p/5271412#M609388</guid>
      <dc:creator>Rita C Workman</dc:creator>
      <dc:date>2011-01-25T14:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: Sendmail Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-vulnerability/m-p/5271413#M609389</link>
      <description>Always HAVE the latest SendMail version as best practice. WHatever your OS vendor provides as the latest should always be on your system.&lt;BR /&gt;&lt;BR /&gt;Or if you BUILD your own Sendmail, always build from the latest Sendmail.Org sources.&lt;BR /&gt;</description>
      <pubDate>Tue, 25 Jan 2011 17:46:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-vulnerability/m-p/5271413#M609389</guid>
      <dc:creator>Zinky</dc:creator>
      <dc:date>2011-01-25T17:46:37Z</dc:date>
    </item>
    <item>
      <title>Re: Sendmail Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-vulnerability/m-p/5271414#M609390</link>
      <description>Hi Rick,&lt;BR /&gt;As per your suggestion the tests are sucessful. We shall decide on updating it to the latest version.</description>
      <pubDate>Fri, 28 Jan 2011 09:45:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sendmail-vulnerability/m-p/5271414#M609390</guid>
      <dc:creator>Venkatesan_5</dc:creator>
      <dc:date>2011-01-28T09:45:09Z</dc:date>
    </item>
  </channel>
</rss>

