Patch-ID# 106815-01 Keywords: security buffer overflow openwindows mailtool vulnerable Synopsis: Trusted Solaris 2.5.1: OpenWindows mailtool is vulnerable to some buffer overflows Date: Nov/29/99 Solaris Release: Trusted_Solaris_2.5.1 SunOS Release: NOTE:5.5.1 Unbundled Product: Unbundled Release: Relevant Architectures: sparc BugId's fixed with this patch: 4175245 Changes incorporated in this version: Patches accumulated and obsoleted by this patch: Patches which conflict with this patch: Patches required with this patch: 106814-01 Obsoleted by: Files included with this patch: SUNWxwplt/openwin/lib/libX11.so.4 SUNWxwslb/openwin/lib/libX11.a SUNWxwslb/openwin/lib/libp/libX11.a Problem Description: 4175245 "OpenWindows mailtool is vulnerable to some buffer overflows" Patch Installation Instructions: -------------------------------- Refer to the Install.info file for instructions on using the generic 'installpatch' and 'backoutpatch' scripts provided with each patch. Any other special or non-generic installation instructions should be described below as special instructions. Special Install Instructions: ----------------------------- Note: The tar "T" flag is required when extracting this patch. Failure to use this option will cause the patch installation to terminate. 1) Login as a user authorized to assume the admin role 2) extract the patch by typing: mkdir ; cd tar xvTf where is the directory which will contain installpatch 3) assume the root role 4) Apply the patch by typing: installpatch where is the directory containing installpatch, and is the directory containing the patch itself. Example: assume admin role $ mkdir /tmp_patchdir/123456-01 $ cd /tmp_patchdir/123456-01 $ tar xvTf /dev/rmt/0 assume root role # cd /tmp_patchdir/123456-01 # ./installpatch .