Last Update:             2-Dec-2002
Operating System:       OpenVMS
Component:              PMDF MAIL User Agent
Base Level Required:    PMDF V6.0-23
Other Requirements:	none

Platform                Subdirectory            File(s) to download
--------                ------------            --------------------
OpenVMS VAX             [.VMS.VAX_EXE]          UA.EXE
OpenVMS ALPHA           [.VMS.ALPHA_EXE]        UA.EXE
Digital UNIX            osf/bin/                n/a
Solaris Sparc           solaris-sparc/bin/      n/a
Solaris Intel           solaris-x86/bin/        n/a
NT Intel                nt/bin/                 n/a


GENERAL INFO
-------------

    When FTPing these images, be sure to FTP them as binary images. Before
 retrieving such an image with the GET command, be sure to put your FTP
 into binary mode with a command such as TYPE IMAGE or TYPE BINARY.


Change history
---------------
6-Sep-2000
  Fixed a problem whereby PMDF MAIL would go CPU bound when trying to read
  a text/html bodypart in a non-DECterm terminal session.

16-Aug-2000
  Fixed a problem whereby the VT100 pop-up FAX form was not working properly on
  VAX systems.  A new PMDFSHR.EXE from 16-Aug-2000 or later is needed in
  addition to the UA.EXE.

17-Jul-2000
  Fixed a problem whereby setting headertrim from an interactive session
  would result in an access violation.  In addition to this new UA.EXE, a 
  PMDFSHR.EXE from 17-Jul-2000 or later is required to fix this problem.

4-Jul-2000
  Made an enhancement whereby the user agent will now remove a character set
  parameter when replying to a message.

19-Jun-2000
  Fixed a problem whereby existing aliases would not be found in the V100 pop-up 
  FAX form.

6-Jun-2000
  Fixed a problem whereby the VT100 pop-up FAX form not working from PMDF MAIL.

5-Mar-2000
  Fixed an error during dispose when sending.

2-Dec-2002
  A potential security vulnerability has been discovered in PMDF MAIL that
  could allow a malicious user to execute arbitrary DCL commands with elevated
  system privileges. Process Software is not aware of any cases in which this
  vulnerability has been exploited. However, we strongly recommend installing
  this patch to eliminate the vulnerability.

Installation
------------

OpenVMS [VAX] [ALPHA]

    UA.EXE needs to be copied to the PMDF_EXE: directory and then installed
with the command:

    $ INSTALL REPLACE PMDF_EXE:UA.EXE

on all members of the OpenVMS cluster running out of the affected PMDF
directory tree.


UNIX [Solaris] [Digital UNIX]

    n/a

NT
    n/a