• Wildcat! OPENSSL Security HotFix: SSL/TLS MITM vulnerability

    From ANDREA SANTOS@1:124/5013 to All on Thu Jan 31 19:12:12 2019
    Date: Wed, 25 Jun 2014 12:36:48 -0400
    To: All
    Subject: Wildcat! OPENSSL Security HotFix: SSL/TLS MITM vulnerability Newsgroups: win.server.program
    Message-ID: <1403714208.32.0@winserver.com>
    X-Mailer: Wildcat! Interactive Net Server v7.0.454.5
    Lines: 36

    Wildcat! OPENSSL Security HotFix: SSL/TLS MITM vulnerability

    The AUP has been updated with the latest OPENSSL security hotfix

    Wildcat! v6.4

    For customers running Wildcat! v6.4 AUP, run your AUTOUPDATE to get
    the new OPENSSL.ZIP. You MUST manually unzip this to get the 3 new files inside the zip.

    Wildcat! v7.0 (CATAPULT)

    For customers using Catapult, Wildcat! 7.0 AUP (CUP), run your
    AUTOUPDATE using the /catapult switch from a DOS command line:

    Autoupdate /catapult

    This will automatically give you the new 3 files. There is no
    OPENSSL.ZIP to unzip. If you see one, it's the old one for the old
    v6.4 you had when you updated to v7.0 which, now, no longer provides
    the zip.

    Note, you can't MIX the two different versions of v6.4 and v7.0
    files. The libeay32.dll, ssleay32.dll, openssl.exe files for
    CATAPULT are recompiled using Microsoft VC10. The ones for the
    older v6.4 are compiled with Microsoft VC6 to maintain maximum
    compatibility. DO NOT MIX THEM, if you do, the v6.4 folks will
    need to install more Microsoft Run Time Library stuff.

    Santronics Software, Inc., 15600 SW 288 St. Suite 306 Homestead, FL 33033
    TEL: 305-248-3204 SALES: 800-845-6944 FAX 305-248-0394
    --- Platinum Xpress/Win/WINServer v3.1
    * Origin: Prison Board BBS Mesquite Tx //telnet.RDFIG.NET www. (1:124/5013)