In all fairness, if this issue is in regards to the Verisign cluster fsck I don't think this has any place in Sendmail personally but rather in getting Verisign to un-fsck the problem and/or fix DNS servers not to respond in that manner as to allow that to happen...
Regards, Jeremy On Thu, Sep 18, 2003 at 12:49:38PM +0900, Hideki Yamane wrote: > Hi list, > > You know, as DSA-384-1, sendmail buffer overflow vulnerability > is fixed but another hole "sendmail relay access restrictions > can be bypassed with bogus DNS"(*) is NOT fixed yet. > > * http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=174907 > > Do you know why maintainer let this issue alone ? > or not effect Debian package? (if so, this bug should be closed.) > > -- > Regards, > > Hideki Yamane mailto:henrich @ iijmio-mail.jp > > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] >
signature.asc
Description: Digital signature