[Please upgrade when a new version of Tripwire is released -- Raju]

This is an RFC 1153 digest.
(1 message)
----------------------------------------------------------------------

Message-ID: <[EMAIL PROTECTED]>
From: Ron Forrester <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Re: Format String Vulnerability in Tripwire
Date: 4 Jun 2004 22:39:13 -0000

In-Reply-To: <[EMAIL PROTECTED]>


Okay folks, one more time.

We've identified a couple more important bits of information regarding this 
vulnerability, mainly that it is present only in the code for processing email reports 
when the MAILMETHOD is sendmail. This provides some important points of clarification:

1) It is not present in our Windows binaries, since sendmail is not an option on this 
platform.

2) Another, and probably best yet workaround on *nix, is to change from using sendmail 
to SMTP as your email method. This requires setting a couple of additional 
configuration variables (SMTPHOST and possibly SMTPPORT).

#2 is true of both our commercial *nix binaries as well as the open source version.

I'll let everyone know if we uncover additional information regarding this issue.

Cheers,

Ron Forrester
Security Architect
Tripwire, Inc.

------------------------------

End of this Digest
******************

-- 
Raj Mathur                [EMAIL PROTECTED]      http://kandalaya.org/
       GPG: 78D4 FC67 367F 40E2 0DD5  0FEF C968 D0EF CC68 D17F
                      It is the mind that moves

_______________________________________________
ilugd mailinglist -- [EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/[EMAIL PROTECTED]/

Reply via email to