(no title)
hdmoore | 2 years ago
Salient quote below:
>In May 2005, Georgi Guninski published "64 bit qmail fun", three vulnerabilities in qmail (CVE-2005-1513, CVE-2005-1514, CVE-2005-1515):
[snip]
>Surprisingly, we re-discovered these vulnerabilities during a recent qmail audit; they have never been fixed because, as stated by qmail's author Daniel J. Bernstein (in https://cr.yp.to/qmail/guarantee.html):
>>"This claim is denied. Nobody gives gigabytes of memory to each qmail-smtpd process, so there is no problem with qmail's assumption that allocated array lengths fit comfortably into 32 bits."
1. https://www.qualys.com/2020/05/19/cve-2005-1513/remote-code-...
edit: added quote from referenced url
tokamak-teapot|2 years ago
It sounds like the Debian packager didn’t follow the instructions. That doesn’t seem like the fault of the software.
rodgerd|2 years ago
qmail is a great demonstration that if you declare enough things out of scope, you can claim that the software is secure.
jiggawatts|2 years ago
Vendors replied to complaints with: “We don’t support those processors”.
No buddy, you don’t support stable software. It’s buggy even on a single core, it’s just less obvious.
stefan_|2 years ago
jeffbee|2 years ago
setproctitle is enough logging for a mailer, said nobody ever.