sendmail 8.14.4

看板FB_security作者時間16年前 (2010/01/16 11:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/2 (看更多)
I'm seeing this in the release notes for the latest release of sendmail, plus a customers PCI scan is reporting this as a problem. I know many of these scans tend to do version string checks and don't actually check if the problem is possible to exploit, but I just wanted your thoughts on if this is something the security team feels it needs to deal with or not? -Phil. 8.14.4/8.14.4 2009/12/30 SECURITY: Handle bogus certificates containing NUL characters in CNs by placing a string indicating a bad certificate in the {cn_subject} or {cn_issuer} macro. Patch inspired by Matthias Andree's changes for fetchmail. _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1BKIlnp_ (FB_security)
文章代碼(AID): #1BKIlnp_ (FB_security)