Don't know
about that, but I just received a notice from CERT
regarding a
buffer overflow bug in sendmail, so best beware .
. .
Fortunately, the patch is trivial (all of a few lines), and requires a
non-standard configuration to even have a hint of exploitability.
Just to take this OT-squared, my biz has gotten two phone calls with week
for the old copier/fax toner telephone scam: "Hi, this is Christy with
<insert fake office supply company name>, can you confirm the model number
on your copier for me?" and a week later you get a huge invoice and a
pallete of second-rate toner cartridges, with no return address, and they
put you into collections if you don't pay.
The sad thing is I'm sure works for them. The easiest and most effective
exploits always seem to rely on simple social engineering.
--Patrick