nmh security update

From: Ruud de Rooij (ruudat_private)
Date: Mon Feb 28 2000 - 09:38:05 PST

  • Next message: Danton Nunes: "false alarms by real secure"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    Versions prior to 1.0.3 of the nmh package contained a vulnerability
    where incoming mail messages with carefully designed MIME headers could
    cause nmh's mhshow command to execute arbitrary shell code.
    
    This bug has been fixed in nmh 1.0.3 and we encourage you to upgrade
    immediately.  The fixed package is available at
    
      ftp://ftp.mhost.com/pub/nmh/nmh-1.0.3.tar.gz
    
    The MD5sum of nmh-1.0.3.tar.gz is 02519bf8f7ff8590ecfbee9f9500ea07.
    
    For the nmh authors,
    
    Ruud de Rooij.
    - --
    ruud de rooij | ruudat_private | ruudat_private | http://ruud.org
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.1 (GNU/Linux)
    Comment: For info see http://www.gnupg.org
    
    iD8DBQE4uq60gWpMJ0LP/ksRAohGAJ90IJAVvyF+ouPkWEFbi5bEFJrhZwCg2yoz
    XhNPTGQCtLHmKGcMsEuOUCE=
    =jZwy
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:38:17 PDT