Sendmail, the web's most popular email message transfer agent, has released a patch for a 'critical' security vulnerability.
The remotely exploitable vulnerability could allow an attacker to gain control of an unpatched Sendmail server.
Security authority the Cert Coordination Centre warned that "parsing code in Sendmail does not adequately check the length of email addresses. An email message with a specially crafted address could trigger a stack overflow."
The vulnerability could be used to cause a denial of service attack and could allow a remote attacker to execute arbitrary code with the privileges of the Sendmail daemon - typically at root level.
"Most organisations have a variety of mail transfer agents [MTAs] at various locations within their network, with at least one exposed to the internet," said Cert.
"Since Sendmail is the most popular MTA, most medium-sized to large organisations are likely to have at least one vulnerable Sendmail server.
"In addition, many Unix and Linux workstations provide a Sendmail implementation that is enabled and running by default."
Cotton seedling freezes to death as Chang'e-4 shuts down for the Moon's 14-day lunar night
Fortnite easily out-earns PUBG, Assassin's Creed Odyssey and Red Dead Redemption 2 in 2018
Meteor showers as a service will be visible for about 100 kilometres in all directions
Saturn's rings only formed in the past 100 million years, suggests analysis of Cassini space probe data
New findings contradict conventional belief that Saturn's rings were formed along with the planet about 4.5 billion years ago