mirror of
https://git.FreeBSD.org/ports.git
synced 2024-11-27 00:57:50 +00:00
35c76eef93
SECURITY RELEASE An out of bounds read in smtpd allows an attacker to inject arbitrary commands into the envelope file which are then executed as root. Separately, missing privilege revocation in smtpctl allows arbitrary commands to be run with the _smtpq group. MFH: 2020Q1
23 lines
567 B
Plaintext
23 lines
567 B
Plaintext
@sample etc/mail/smtpd.conf.sample
|
|
bin/smtp
|
|
libexec/opensmtpd/encrypt
|
|
libexec/opensmtpd/lockspool
|
|
libexec/opensmtpd/mail.lmtp
|
|
libexec/opensmtpd/mail.local
|
|
libexec/opensmtpd/mail.maildir
|
|
libexec/opensmtpd/mail.mboxfile
|
|
libexec/opensmtpd/mail.mda
|
|
%%TABLE_DB%%libexec/opensmtpd/makemap
|
|
@(,_smtpq,2555) sbin/smtpctl
|
|
sbin/smtpd
|
|
man/man1/smtp.1.gz
|
|
man/man5/aliases.5.gz
|
|
man/man5/forward.5.gz
|
|
man/man5/smtpd.conf.5.gz
|
|
man/man5/table.5.gz
|
|
%%TABLE_DB%%man/man8/makemap.8.gz
|
|
%%TABLE_DB%%man/man8/newaliases.8.gz
|
|
man/man8/sendmail.8.gz
|
|
man/man8/smtpctl.8.gz
|
|
man/man8/smtpd.8.gz
|