[38342] in bugtraq

home help back first fref pref prev next nref lref last post

Gld 1.5 released (security fix)

daemon@ATHENA.MIT.EDU (Salim Gasmi)
Wed Apr 13 16:36:26 2005

Date: 13 Apr 2005 17:47:36 -0000
Message-ID: <20050413174736.20947.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Salim Gasmi <salim@gasmi.net>
To: bugtraq@securityfocus.com

In-Reply-To: <20050412004111.562AC7A890E@ws4-4.us4.outblaze.com>

Hi,

gld 1.5 has been released today .

This version fixes the issues and add new features .

You can download it here : http://www.gasmi.net/down/gld-1.5.tgz

Note about the exploit released:
To be effective, the exploit needs to connect via TCP to gld.
Normally, gld listen only to loopback interface (default option)
and thus disable the exploit.

In the rare cases, where gld listen on a real network interface
(in case where gld server is on a different host than smtp servers)
it must be configured to only accept trusted smtp servers to connect to
and of course not everybody, this of course disable the exploit too.

Finally, by default gld run as nobody, and thus, no root access should
be directly possible via gld .

Best regards,

Salim

home help back first fref pref prev next nref lref last post