<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PLEASE PATCH YOUR SENDMAIL! in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/please-patch-your-sendmail/m-p/2918397#M78346</link>
    <description>Any flavor of Unix needs to be patched. the group "LSD" has proven Tuesday to break into Redhat and Debian so far. All relevant patches are now available at:&lt;BR /&gt;&lt;BR /&gt;Hewlett Packard: &lt;A href="http://www.hp.com/support" target="_blank"&gt;www.hp.com/support&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;IBM: &lt;A href="http://www.ibm.com/support" target="_blank"&gt;www.ibm.com/support&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;RedHat Linux: &lt;A href="http://www.redhat.com/apps/support/errata" target="_blank"&gt;www.redhat.com/apps/support/errata&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;SGI: support.sgi.com &lt;BR /&gt;Sun: sunsolve.sun.com/patches &lt;BR /&gt;&lt;BR /&gt;SuSE Linux: /&lt;A href="http://www.suse.com/us/private/support/security" target="_blank"&gt;www.suse.com/us/private/support/security&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;Of course BSD and others also have patches avail, just do not have the links right here in front of me. I have seen that SuSE, Redhat, Connectiva, and Mandrake have these on thier FTPs now.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Wed, 05 Mar 2003 07:48:54 GMT</pubDate>
    <dc:creator>Jon_87</dc:creator>
    <dc:date>2003-03-05T07:48:54Z</dc:date>
    <item>
      <title>PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-linux/please-patch-your-sendmail/m-p/2918393#M78342</link>
      <description>This was reported by  Dan Ingevaldson, team leader of X-Force research and development at ISS, who first discovered the vulnerability. &lt;A href="http://www.linuxworld.com/go.cgi?id=741963" target="_blank"&gt;http://www.linuxworld.com/go.cgi?id=741963&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;"What makes the new vulnerability particularly pernicious is that attackers would need to know little about the server they were attacking other than its Internet address.&lt;BR /&gt;It's quite a dangerous vulnerability because an exploit could be contained in the e-mail message itself. The attacker doesn't need to set up an elaborate system to launch the attack. They could just send an e-mail message to a server, and if the server is vulnerable the attack would be launched.&lt;BR /&gt;&lt;BR /&gt;The combination of freely visible source code, a severe and remotely exploitable vulnerability, and an enormous installed base of vulnerable servers make the new Sendmail vulnerability an extremely high-value target for the hacking community, according to Ingevaldson. &lt;BR /&gt;&lt;BR /&gt;That means that it is critical for affected organizations to patch their servers.&lt;BR /&gt;&lt;BR /&gt;Once an exploit is published, all bets are off. The window of vulnerability has decreased. there have been some very robust powerful exploits released within a few months of the exploit being published, so if patching was not a big deal before, it is now." &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Berlene</description>
      <pubDate>Tue, 04 Mar 2003 13:34:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/please-patch-your-sendmail/m-p/2918393#M78342</guid>
      <dc:creator>Berlene Herren</dc:creator>
      <dc:date>2003-03-04T13:34:26Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-linux/please-patch-your-sendmail/m-p/2918394#M78343</link>
      <description>Was this for all versions of Sendmail on all Operationg Systems?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;The link only mentioned the Linux operating system.&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Mar 2003 13:58:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/please-patch-your-sendmail/m-p/2918394#M78343</guid>
      <dc:creator>Krishna Prasad</dc:creator>
      <dc:date>2003-03-04T13:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-linux/please-patch-your-sendmail/m-p/2918395#M78344</link>
      <description>Ron, a complete list can be found here:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.cert.org/advisories/CA-2003-07.html" target="_blank"&gt;http://www.cert.org/advisories/CA-2003-07.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Berlene</description>
      <pubDate>Tue, 04 Mar 2003 14:05:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/please-patch-your-sendmail/m-p/2918395#M78344</guid>
      <dc:creator>Berlene Herren</dc:creator>
      <dc:date>2003-03-04T14:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-linux/please-patch-your-sendmail/m-p/2918396#M78345</link>
      <description>sendmail-8.11.6-15&lt;BR /&gt;&lt;BR /&gt;vulnerable?  Not?&lt;BR /&gt;&lt;BR /&gt;RH 7.3 Intel&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Wed, 05 Mar 2003 00:29:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/please-patch-your-sendmail/m-p/2918396#M78345</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-03-05T00:29:35Z</dc:date>
    </item>
    <item>
      <title>Re: PLEASE PATCH YOUR SENDMAIL!</title>
      <link>https://community.hpe.com/t5/operating-system-linux/please-patch-your-sendmail/m-p/2918397#M78346</link>
      <description>Any flavor of Unix needs to be patched. the group "LSD" has proven Tuesday to break into Redhat and Debian so far. All relevant patches are now available at:&lt;BR /&gt;&lt;BR /&gt;Hewlett Packard: &lt;A href="http://www.hp.com/support" target="_blank"&gt;www.hp.com/support&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;IBM: &lt;A href="http://www.ibm.com/support" target="_blank"&gt;www.ibm.com/support&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;RedHat Linux: &lt;A href="http://www.redhat.com/apps/support/errata" target="_blank"&gt;www.redhat.com/apps/support/errata&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;SGI: support.sgi.com &lt;BR /&gt;Sun: sunsolve.sun.com/patches &lt;BR /&gt;&lt;BR /&gt;SuSE Linux: /&lt;A href="http://www.suse.com/us/private/support/security" target="_blank"&gt;www.suse.com/us/private/support/security&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;Of course BSD and others also have patches avail, just do not have the links right here in front of me. I have seen that SuSE, Redhat, Connectiva, and Mandrake have these on thier FTPs now.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 05 Mar 2003 07:48:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/please-patch-your-sendmail/m-p/2918397#M78346</guid>
      <dc:creator>Jon_87</dc:creator>
      <dc:date>2003-03-05T07:48:54Z</dc:date>
    </item>
  </channel>
</rss>

