From 6b713ec7f240e4ffc03810b5e5ca5b995e1083a1 Mon Sep 17 00:00:00 2001 From: "Bruce A. Mah" Date: Mon, 3 Mar 2003 18:23:57 +0000 Subject: [PATCH] SA:03-04 note was a poor cut-n-paste from the SA. Do it right this time. --- release/doc/en_US.ISO8859-1/errata/article.sgml | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/release/doc/en_US.ISO8859-1/errata/article.sgml b/release/doc/en_US.ISO8859-1/errata/article.sgml index 964722fc1e27..8145e5188188 100644 --- a/release/doc/en_US.ISO8859-1/errata/article.sgml +++ b/release/doc/en_US.ISO8859-1/errata/article.sgml @@ -133,10 +133,10 @@ given in security advisory FreeBSD-SA-03:03. - Due to a buffer overflow in header parsing, a remote - attacker could create a specially crafted message that may cause - sendmail to execute arbitrary code - with the privileges of the user running sendmail, typically + Due to a buffer overflow in header parsing in sendmail, a remote + attacker can create a specially-crafted message that may cause + &man.sendmail.8; to execute arbitrary code + with the privileges of the user running it, typically root. More information, including pointers to patches, can be found in security advisory FreeBSD-SA-03:04.