<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PLEASE PATCH YOUR SENDMAIL! in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918411#M817828</link>
    <description>Hi Berlene,&lt;BR /&gt;&lt;BR /&gt;I've done as Patrick &amp;amp; just stopped accepting mail on servers that don't need to.&lt;BR /&gt;&lt;BR /&gt;But I have a question.&lt;BR /&gt;I understand that the exploit is message-oriented and MTAs will just merrily pass it along to its destination. But if the affected server resides behind solid firewalls, how does the system get exploited by the sender AFTER the buffer overflow? Can this thing capture files on internal servers &amp;amp; send them out to be examined or cracked?&lt;BR /&gt;I don't see this exploit as being able to affect FWs as well, or am I missing something here?&lt;BR /&gt;I guess the vulnerability could be exploited by internal personnel.....&lt;BR /&gt;&lt;BR /&gt;I see the major, urgent problems on I-net facing &amp;amp; DMZ systems more so than well protected, internal systems.&lt;BR /&gt;Would you agree?&lt;BR /&gt;&lt;BR /&gt;I don't wish to make light of the situation at all, but at the same time I don't want a "chicken little" syndrome spawning unnecessary fear levels. We're being subjected to far too much of this fear-mongering already outside of our work environments, wouldn't you think?&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jeff</description>
    <pubDate>Tue, 04 Mar 2003 20:09:42 GMT</pubDate>
    <dc:creator>Jeff Schussele</dc:creator>
    <dc:date>2003-03-04T20:09:42Z</dc:date>
    <item>
      <title>PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918399#M817816</link>
      <description>&lt;BR /&gt;This was reported by  Dan Ingevaldson, team leader of X-Force research and development at ISS, who first discovered the vulnerability. &lt;A href="http://www.linuxworld.com/go.cgi?id=741963" target="_blank"&gt;http://www.linuxworld.com/go.cgi?id=741963&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;"What makes the new vulnerability particularly pernicious is that attackers would need to know little about the server they were attacking other than its Internet address.&lt;BR /&gt;It's quite a dangerous vulnerability because an exploit could be contained in the e-mail message itself. The attacker doesn't need to set up an elaborate system to launch the attack. They could just send an e-mail message to a server, and if the server is vulnerable the attack would be launched.&lt;BR /&gt;&lt;BR /&gt;The combination of freely visible source code, a severe and remotely exploitable vulnerability, and an enormous installed base of vulnerable servers make the new Sendmail vulnerability an extremely high-value target for the hacking community, according to Ingevaldson. &lt;BR /&gt;&lt;BR /&gt;That means that it is critical for affected organizations to patch their servers.&lt;BR /&gt;&lt;BR /&gt;Once an exploit is published, all bets are off. The window of vulnerability has decreased. there have been some very robust powerful exploits released within a few months of the exploit being published, so if patching was not a big deal before, it is now." &lt;BR /&gt;&lt;BR /&gt;See HPSBUX0302-246   SSRT3469 Potential Security Vulnerability in sendmail&lt;BR /&gt;&lt;BR /&gt;Berlene</description>
      <pubDate>Tue, 04 Mar 2003 13:36:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918399#M817816</guid>
      <dc:creator>Berlene Herren</dc:creator>
      <dc:date>2003-03-04T13:36:05Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918400#M817817</link>
      <description>What is the HP Patch Depot's designation?&lt;BR /&gt;&lt;BR /&gt;Where is it an since I think it does not exist, when it it goiing to be ready.&lt;BR /&gt;&lt;BR /&gt;All my sendmail updates have been from HP patch depots and I'm not going to screw things up by messing around with a gz file.&lt;BR /&gt;&lt;BR /&gt;I've been very agressive at putting in patches and security_patch_check is run weekly and shows no necessary patches.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 04 Mar 2003 19:27:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918400#M817817</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-03-04T19:27:37Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918401#M817818</link>
      <description>Steven,&lt;BR /&gt;&lt;BR /&gt;Instructions are in the link which everyone has been pointing to.  It is not in SD format (yet), however, it is very easy to install.&lt;BR /&gt;&lt;BR /&gt;See:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0xdd549c196a4bd71190080090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0xdd549c196a4bd71190080090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Pete</description>
      <pubDate>Tue, 04 Mar 2003 19:30:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918401#M817818</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2003-03-04T19:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918402#M817819</link>
      <description>It is not a patch, it is a new binary.&lt;BR /&gt;&lt;BR /&gt;Berlene</description>
      <pubDate>Tue, 04 Mar 2003 19:31:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918402#M817819</guid>
      <dc:creator>Berlene Herren</dc:creator>
      <dc:date>2003-03-04T19:31:26Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918403#M817820</link>
      <description>I agree that I would like to see the fix in a patch format ASAP. &lt;BR /&gt;If for no other reason than version control.&lt;BR /&gt;May sound trivial, but if you have *hundreds* of systems, tell me how one could easily tell if they're *all* patched or not?&lt;BR /&gt;IF it was a patch, this would be much, much easier.&lt;BR /&gt;So keep pushing for a patch ASAP, if you would please Berlene.&lt;BR /&gt;&lt;BR /&gt;Thx,&lt;BR /&gt;Jeff</description>
      <pubDate>Tue, 04 Mar 2003 19:35:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918403#M817820</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2003-03-04T19:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918404#M817821</link>
      <description>Better yet (and this is what I'm doing) if your machine is not a mail server, turn sendmail off.  You don't HAVE to run sendmail in order to send mail from the server.</description>
      <pubDate>Tue, 04 Mar 2003 19:38:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918404#M817821</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2003-03-04T19:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918405#M817822</link>
      <description>Patches are in the works, but they take more time :-)  We wanted an immediate fix for this vulnerability.&lt;BR /&gt;&lt;BR /&gt;Check for the JAG to confirm fix:&lt;BR /&gt;&lt;BR /&gt;#what /usr/sbin/sendmail &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;8.9.3 / 10.20&lt;BR /&gt;  Copyright (c) 1998 HEWLETT PACKARD COMPANY and its licensors, including Sendmail, Inc., and the Regents of the            University of California.  All rights reserved. &lt;BR /&gt;version.c       8.9.3.1 (Berkeley) 18/09/2001 (PHNE_25183+JAGae58098) &lt;BR /&gt;&lt;BR /&gt;11.X / 8.11.1&lt;BR /&gt;Copyright (c) 1998 HEWLETT PACKARD COMPANY and its licensors, including Sendmail, Inc., and the Regents of the              University of California.  All rights reserved. &lt;BR /&gt;version.c  8.11.1 (Berkeley) - Revision 1.2+JAGae58098 - 2002/07/31 &lt;BR /&gt;&lt;BR /&gt;Berlene</description>
      <pubDate>Tue, 04 Mar 2003 19:39:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918405#M817822</guid>
      <dc:creator>Berlene Herren</dc:creator>
      <dc:date>2003-03-04T19:39:13Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918406#M817823</link>
      <description>Steve and Jeff,&lt;BR /&gt;&lt;BR /&gt;I've already downloaded the patched sendmail executable and I've patched an 11.00 and an 11i box here.  The instructions with the fix include a command to get the version of sendmail running on a box.  Here is what I see before installing the sendmail binary [on an 11i box]:&lt;BR /&gt;&lt;BR /&gt;Version 8.9.3 (PHNE_25184)&lt;BR /&gt;&lt;BR /&gt;and here is what I see afterwards:&lt;BR /&gt;&lt;BR /&gt;Version 8.9.3 (PHNE_26305+JAGae58098)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;So there is a way to tell if the new binary has been installed or not.  I agree that having it in a patch is nice, but it is also nice that HP has jumped on this issue and provided the fix so fast [many thanks to everyone involved please Berlene!].  It was nice this morning when the local Windows/Intel people started forwarding the sendmail stories to me via e-mail and I was able to tell them that we already knew about it and had the fix on hand thanks to HP.   :)&lt;BR /&gt;&lt;BR /&gt;JP&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Mar 2003 19:41:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918406#M817823</guid>
      <dc:creator>John Poff</dc:creator>
      <dc:date>2003-03-04T19:41:07Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918407#M817824</link>
      <description>I know how to do it.&lt;BR /&gt;&lt;BR /&gt;I like being able to get my sendmail version from swlist&lt;BR /&gt;&lt;BR /&gt;[5031#] swlist -l product | grep sendmail&lt;BR /&gt;  PHNE_25184            1.0            sendmail(1m) 8.9.3 patch&lt;BR /&gt;&lt;BR /&gt;I guess my question is to maintain this crutch, when is it coming out in SD format.  Being behind a firewall and accepting no outside mail I judge my vulnerability as low.&lt;BR /&gt;&lt;BR /&gt;The bad part is management here does watch cnn/msnbc and are already grumbling about this.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 04 Mar 2003 19:43:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918407#M817824</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-03-04T19:43:22Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918408#M817825</link>
      <description>Ah, but Steven, here is the nasty part of this vulnerability.&lt;BR /&gt;&lt;BR /&gt;  This vulnerability is message-oriented as opposed to connection-oriented,   so internal systems are just as vulnerable to exploit as internet facing systems. That means that the vulnerability is triggered by the contents of a specially-crafted email message rather than by lower-level network traffic. This is important because an MTA that does not contain the &lt;BR /&gt;vulnerability will pass the malicious message along to other MTAs that may be protected at the network level. In other words, vulnerable sendmail servers on the interior of a network are still at risk, even if &lt;BR /&gt;the site's border MTA uses software other than sendmail. Also, messages &lt;BR /&gt;capable of exploiting this vulnerability may pass undetected through many &lt;BR /&gt;common packet filters or firewalls.&lt;BR /&gt;&lt;BR /&gt;Berlene</description>
      <pubDate>Tue, 04 Mar 2003 19:50:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918408#M817825</guid>
      <dc:creator>Berlene Herren</dc:creator>
      <dc:date>2003-03-04T19:50:12Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918409#M817826</link>
      <description>Okay Berlene that actually makes me feel better.&lt;BR /&gt;&lt;BR /&gt;Our email infrastructure is exchange oriented with a smtp relay server to route and handle inbound/outbound traffic.  The smtp server is programmed under no circumstances to send any mail messages to our HP-UX servers.&lt;BR /&gt;&lt;BR /&gt;When I send out a message off one of my UX servers and its to a bad address, I can't get the bounce, because of the configuration.&lt;BR /&gt;&lt;BR /&gt;Obviously someone could mess with the Exchange or SMTP servers, but if they can't send mail to the UX boxes, is there a problem?&lt;BR /&gt;&lt;BR /&gt;This has btw been a fascinating discussion.  I've learned a lot.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 04 Mar 2003 20:00:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918409#M817826</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-03-04T20:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918410#M817827</link>
      <description>Steven, you sound like you have the HPUX boxes covered.  If they do not receive mail, then they cannot be exploited by this vulnerability.  &lt;BR /&gt;&lt;BR /&gt;And it has been fun, hasn't it? :-)&lt;BR /&gt;&lt;BR /&gt;Berlene</description>
      <pubDate>Tue, 04 Mar 2003 20:05:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918410#M817827</guid>
      <dc:creator>Berlene Herren</dc:creator>
      <dc:date>2003-03-04T20:05:51Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918411#M817828</link>
      <description>Hi Berlene,&lt;BR /&gt;&lt;BR /&gt;I've done as Patrick &amp;amp; just stopped accepting mail on servers that don't need to.&lt;BR /&gt;&lt;BR /&gt;But I have a question.&lt;BR /&gt;I understand that the exploit is message-oriented and MTAs will just merrily pass it along to its destination. But if the affected server resides behind solid firewalls, how does the system get exploited by the sender AFTER the buffer overflow? Can this thing capture files on internal servers &amp;amp; send them out to be examined or cracked?&lt;BR /&gt;I don't see this exploit as being able to affect FWs as well, or am I missing something here?&lt;BR /&gt;I guess the vulnerability could be exploited by internal personnel.....&lt;BR /&gt;&lt;BR /&gt;I see the major, urgent problems on I-net facing &amp;amp; DMZ systems more so than well protected, internal systems.&lt;BR /&gt;Would you agree?&lt;BR /&gt;&lt;BR /&gt;I don't wish to make light of the situation at all, but at the same time I don't want a "chicken little" syndrome spawning unnecessary fear levels. We're being subjected to far too much of this fear-mongering already outside of our work environments, wouldn't you think?&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jeff</description>
      <pubDate>Tue, 04 Mar 2003 20:09:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918411#M817828</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2003-03-04T20:09:42Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918412#M817829</link>
      <description>I've just run a telnet 25 test.&lt;BR /&gt;&lt;BR /&gt;My servers can accept mail directed at them from any workstation on my network.&lt;BR /&gt;&lt;BR /&gt;This means I am vulnerable.&lt;BR /&gt;&lt;BR /&gt;The good news is outside our department there are no users in the organization with near enough knowledge to exploit the problem.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Tue, 04 Mar 2003 20:16:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918412#M817829</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-03-04T20:16:03Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918413#M817830</link>
      <description>For visibilty, bouncing this back to the top!&lt;BR /&gt;&lt;BR /&gt;Everyone, please make sure you are not vulnerable.</description>
      <pubDate>Wed, 05 Mar 2003 14:13:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918413#M817830</guid>
      <dc:creator>Robert Gamble</dc:creator>
      <dc:date>2003-03-05T14:13:13Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918414#M817831</link>
      <description>Thanks everyone!  I've installed the fix on all of my servers and feel better.  Made me look good to mgmt too!&lt;BR /&gt;&lt;BR /&gt;I haven't seen an answer to this question in the documentation.   In what manner is the priveleged access exploited.  Is the intruder coming in via telnet after you've been hit or are they executing code as root via the received email message. &lt;BR /&gt;&lt;BR /&gt;For instance, would there be a root entry in wtmp assuming the intruder didn't mess with this file?  I understand all of the implications of a root level intruder covering up their trail.  Just wondering if they are logging in or executing code.  Either way, scary stuff. &lt;BR /&gt;</description>
      <pubDate>Wed, 05 Mar 2003 16:47:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918414#M817831</guid>
      <dc:creator>John J Read</dc:creator>
      <dc:date>2003-03-05T16:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918415#M817832</link>
      <description>John,&lt;BR /&gt;&lt;BR /&gt;I was just reading my SANS Newsbites about this.  Here's what they had to say:&lt;BR /&gt;&lt;BR /&gt;--Sendmail Vulnerability Demonstrates New DHS Capabilities&lt;BR /&gt;(3 March 2003)&lt;BR /&gt;A vulnerability was reported in Sendmail that allows root access simply&lt;BR /&gt;by sending a specially crafted email. Action by the Department of&lt;BR /&gt;Homeland Security and affected vendors led to a coordinated program for&lt;BR /&gt;patch development, early warning for critical infrastructure industries&lt;BR /&gt;and government agencies, and broad information dissemination, while&lt;BR /&gt;maintaining secrecy until the&lt;BR /&gt;&lt;A href="http://www.washingtonpost.com/wp-dyn/articles/A41859-2003Mar4.html" target="_blank"&gt;http://www.washingtonpost.com/wp-dyn/articles/A41859-2003Mar4.html&lt;/A&gt; &lt;A href="http://www.cert.org/advisories/CA-2003-07.html" target="_blank"&gt;http://www.cert.org/advisories/CA-2003-07.html&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.msnbc.com/news/880094.asp?0cv=CB10" target="_blank"&gt;http://www.msnbc.com/news/880094.asp?0cv=CB10&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://www.computerworld.com/securitytopics/security/holes/story/0,10801,78991,00.html" target="_blank"&gt;http://www.computerworld.com/securitytopics/security/holes/story/0,10801,78991,00.html&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://news.com.com/2100-1009-990802.html" target="_blank"&gt;http://news.com.com/2100-1009-990802.html&lt;/A&gt;&lt;BR /&gt;SANS web broadcast features people from sendmail.com, ISS,&lt;BR /&gt;SourceFire, and the SANS faculty experts answering questions about the&lt;BR /&gt;vulnerability, what systems are vulnerable, and what can be done to&lt;BR /&gt;protect Sendmail beyond patching.  Also includes a brief discussion&lt;BR /&gt;of the new Snort vulnerability.&lt;BR /&gt;&lt;A href="http://www.sans.org/webcasts/030303.php" target="_blank"&gt;http://www.sans.org/webcasts/030303.php&lt;/A&gt;&lt;BR /&gt;Free, requires registration&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I apologise for the truncation right before the list of URL's.  That's the way SANS published it.&lt;BR /&gt;&lt;BR /&gt;Pete</description>
      <pubDate>Wed, 05 Mar 2003 16:58:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918415#M817832</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2003-03-05T16:58:10Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918416#M817833</link>
      <description>Excellent information, Pete! Thanks so much for sharing this with the community.&lt;BR /&gt;&lt;BR /&gt;Berlene</description>
      <pubDate>Wed, 05 Mar 2003 17:09:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918416#M817833</guid>
      <dc:creator>Berlene Herren</dc:creator>
      <dc:date>2003-03-05T17:09:02Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918417#M817834</link>
      <description>Berlene,&lt;BR /&gt;&lt;BR /&gt;Glad to - this thing scares me!&lt;BR /&gt;&lt;BR /&gt;Pete</description>
      <pubDate>Wed, 05 Mar 2003 17:12:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918417#M817834</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2003-03-05T17:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918418#M817835</link>
      <description>JP: From my experience, the only way to tell if you have the patched binary running is to run the following:&lt;BR /&gt;&lt;BR /&gt;strings /usr/lib/sendmail | grep Dropped&lt;BR /&gt;&lt;BR /&gt;You should get the following output:&lt;BR /&gt;&lt;BR /&gt;Dropped invalid comments from header address&lt;BR /&gt;&lt;BR /&gt;If your sendmail binary is not patched, you won't get any output.&lt;BR /&gt;&lt;BR /&gt;This is true for patched sendmail binaries on all platforms (from what I can tell).&lt;BR /&gt;&lt;BR /&gt;-- Edmund.</description>
      <pubDate>Thu, 06 Mar 2003 02:03:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/please-patch-your-sendmail/m-p/2918418#M817835</guid>
      <dc:creator>Edmund Ng</dc:creator>
      <dc:date>2003-03-06T02:03:15Z</dc:date>
    </item>
  </channel>
</rss>

