oss-sec mailing list archives
Re: Remote Code Execution in qmail (CVE-2005-1513)
From: Qualys Security Advisory <qsa () qualys com>
Date: Wed, 20 May 2020 10:39:17 -0700
Hi Georgi, On Wed, May 20, 2020 at 11:54:06AM +0300, Georgi Guninski wrote:
Did djb award you monetary bounty?
No, he considers that this is a vulnerability in the OS startup scripts, not in qmail itself. In any case, the bug bounty would be yours, of course. Thanks again for all your security research, and your qmail research in particular! With best regards, -- the Qualys Security Advisory team [https://d1dejaj6dcqv24.cloudfront.net/asset/image/email-banner-384-2x.png]<https://www.qualys.com/email-banner> This message may contain confidential and privileged information. If it has been sent to you in error, please reply to advise the sender of the error and then immediately delete it. If you are not the intended recipient, do not read, copy, disclose or otherwise use this message. The sender disclaims any liability for such unauthorized use. NOTE that all incoming emails sent to Qualys email accounts will be archived and may be scanned by us and/or by external service providers to detect and prevent threats to our systems, investigate illegal or inappropriate behavior, and/or eliminate unsolicited promotional emails (“spam”). If you have any concerns about this process, please contact us.
Current thread:
- Remote Code Execution in qmail (CVE-2005-1513) Qualys Security Advisory (May 19)
- Re: Remote Code Execution in qmail (CVE-2005-1513) Georgi Guninski (May 20)
- Re: Remote Code Execution in qmail (CVE-2005-1513) Qualys Security Advisory (May 20)
- Re: Remote Code Execution in qmail (CVE-2005-1513) Qualys Security Advisory (Jun 16)
- Re: Remote Code Execution in qmail (CVE-2005-1513) Georgi Guninski (May 20)