Last Update:             2-Dec-2002
Operating System:       OpenVMS
Component:              PMDF MAIL User Agent
Base Level Required:    PMDF V6.2
Other Requirements:	none

Platform                Subdirectory            File(s) to download
--------                ------------            --------------------
OpenVMS VAX             [.VMS.VAX_EXE]          UA.EXE
OpenVMS ALPHA           [.VMS.ALPHA_EXE]        UA.EXE
Solaris Sparc           solaris-sparc/bin/      n/a
Solaris Intel           solaris-x86/bin/        n/a
Tru64                   osf/bin/                n/a
Windows NT x86          nt/bin/                 n/a
Windows 2000 x86        w2k/bin/                n/a



GENERAL INFO
-------------
     Patches may be obtained from the anonymous FTP account on
  ftp.pmdf.process.com.  Use FTP to connect to the host ftp.pmdf.process.com
  and login as the user anonymous.  Use your e-mail address as the login 
  password.

     Move to the pmdf_62_patches subdirectory:

        ftp> cd pmdf_62_patches

     Patches will be located in platform-specific sub-trees, as follows:

        Platform        Subdirectory
        --------        ------------
        OpenVMS         vms
        Solaris/SPARC   solaris-sparc
        Solaris/x86     solaris-x86
        Tru64           osf
        Windows NT      nt
        Windows 2000    w2k

    When FTPing these images, be sure to FTP them as binary images. Before
 retrieving such an image with the GET command, be sure to put your FTP
 into binary mode with a command such as TYPE IMAGE or TYPE BINARY.



Change history
---------------
2-Dec-2002
  A potential security vulnerability has been discovered in PMDF MAIL that
  could allow a malicious user to execute arbitrary DCL commands with elevated
  system privileges. Process Software is not aware of any cases in which this
  vulnerability has been exploited. However, we strongly recommend installing
  this patch to eliminate the vulnerability.

Installation
------------

OpenVMS [VAX] [ALPHA]

    UA.EXE needs to be copied to the PMDF_EXE: directory and then installed
with the command:

    $ INSTALL REPLACE PMDF_EXE:UA.EXE

on all members of the OpenVMS cluster running out of the affected PMDF
directory tree.



UNIX [Solaris] [Digital UNIX]

    n/a

NT
    n/a