AnNyung Official Homepage Home > Update [ 1.3 ]  

HOME
What is AnNyung
Documents
Packages System
White Paper
Download
Update
  . 3.x [RSS]
  . 2.x [RSS]
  . 1.3 [RSS]
  . 1.2 [RSS]
  . 1.1 [RSS]
  . 1.0 [RSS]
FAQ
Hardware
RoadMap
Gallery

  Go oops.org
  AnNyung banner 88x31

  AnNyung 1 banner 80x15
  AnNyung 2 banner 80x15
  AnNyung 3 banner 80x15
  AnNyung banner 80x15
  AnNyung banner 80x15



sendmail 보안 업데이트
Web Browser 로는 FTP 접속이 불가능 합니다.

문서번호 : 1270127615
업데이트 : 2010.04.01


상세내용

8.14.4 update
CVE-2009-4565 fixed

CVE-2009-4565:
sendmail before 8.14.4 does not properly handle a '\0' character in a
Common Name (CN) field of an X.509 certificate, which (1) allows
man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers
via a crafted server certificate issued by a legitimate Certification
Authority, and (2) allows remote attackers to bypass intended access
restrictions via a crafted client certificate issued by a legitimate
Certification Authority, a related issue to CVE-2009-2408.


* 주의

sendmail update 후에, 기존의 sendmail.cf 는 sendmail.cf.rpmsave 로
백업이 됩니다. 그러므로 이전의 설정을 새 sendmail.cf 에 적용해 주셔야
합니다. 설치된 기본값으로 사용하신 다면 신경쓰지 않아도 상관 없습니다.


Autoupdates 지원 : Packages System
  pkgadd -F "sendmail*"


update 패키지

  RPMS :

    . sendmail-8.14.4-1.i686.rpm
    . sendmail-devel-8.14.4-1.i686.rpm
    . sendmail-cf-8.14.4-1.i686.rpm

  SRPMS :

    . sendmail-8.14.4-1.src.rpm


참고 :
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4565



    



 Home > Update [ 1.3 ]

Copyright 2018 OOPS Development Organization 
LAST MODIFIED: 2016/04/24