On 10/02/2011 22:01, David F. Skoll wrote:
On Fri, 11 Feb 2011 09:50:05 +1300
Jason Haar<jason.h...@trimble.co.nz>  wrote:

That exploit is dated Mar 2010? Has this really not been fixed in
about a year???
If everyone is talking about http://savannah.nongnu.org/projects/spamass-milt/,
it looks like the last release was in 2006.  It looks like that project
is abandoned.


Not quite abandoned:

*From*:         Dan Nelson
*Subject*: Re: alert: New event: ET EXPLOIT Possible SpamAssassin Milter Plugin Remote Arbitrary Command Injection Attempt
*Date*:         Fri, 11 Feb 2011 00:08:26 -0600
*User-agent*:   Mutt/1.5.21 (2010-09-15)

------------------------------------------------------------------------

In the last episode (Feb 10), Don Armstrong said:
/  On Thu, 10 Feb 2011, Adam Katz wrote:/
/  >  On 02/10/2011 10:21 AM, David F. Skoll wrote:/
/  >  >  Aieee.... popen() in security-sensitive software!??!??/
/  >  >  /
/  >  >  Also, why does the milter process run as root?  That seems like a huge/
/  >  >  hole all by itself./
/  >  /
/  >  Does this affect sendmail as well as postfix?/
/  /
/  It only affects you if you're running with -x. This was patched in/
/  Debian and Redhat in March of 2010./
/  /
/  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=573228/

I thought I committed the patch to CVS, but apparently hadn't.  It's
committed now, and I'll do a release this weekend.

--
        Dan Nelson
        address@hidden


--
Best Regards,

Giles Coochey
NetSecSpec Ltd
NL T-Systems Mobile: +31 681 265 086
NL Mobile: +31 626 508 131
GIB Mobile: +350 5401 6693
Email/MSN/Live Messenger: gi...@coochey.net
Skype: gilescoochey



Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to