Package: postgrey
Version: 1.18-2
Severity: critical
Justification: breaks the whole system


Postgrey 1.21 was release due to a remotely exploitable DoS
vulnerability:

Changes
-------

* 2005-04-14: version 1.21

   Security: this release fixes a remotely exploitable DoS
   vulnerability.

      - fix crash with '%' in sender addresses (Stefan Schmidt)
      - fix other users of unchecked strings with syslog/printf
        (Peter Bieringer)
      - run in tainted mode -T (Peter Bieringer)
        (version 1.19 and 1.20 were released on the same day
        with the above fixes)
                   

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.11ac6
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages postgrey depends on:
ii  debconf                       1.4.30.11  Debian configuration management sy
ii  libberkeleydb-perl            0.26-3     use Berkeley DB 4 databases from P
ii  libnet-dns-perl               0.48-1     Perform DNS queries from a Perl sc
ii  libnet-server-perl            0.87-3     An extensible, general perl server
ii  perl                          5.8.4-8    Larry Wall's Practical Extraction 
ii  ucf                           1.17       Update Configuration File: preserv

-- debconf information:
  postgrey/1.13-5_move-db:
  postgrey/1.14-1_lookup-by-subnet:
* postgrey/1.13-5_old-config:


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to