No viruses were found.
Banned name: .exe,.exe-ms,2 MEA & EVA COMB SAILING Docs Inv#483099 SKMBT.exe
Content type: Banned
Internal reference code for the message is 02535-04/m4_zwt9D5HlL
First upstream SMTP client IP address: [216.55.167.101] mail.bel.com.bd
According to a 'Received:' trace, the message apparently originated at:
[216.55.167.101], 10-64-1-16.phx.dedicated.codero.com mail.bel.com.bd
[216.55.167.101]
Return-Path: <merchandiser2mkw(a)magpiegroupbd.com>
From: merchandiser2mkw(a)magpiegroupbd.com
Message-ID: <8f93ed779ca92e7962af6ee3d5b18566(a)magpiegroupbd.com>
Subject: FW: AWB:194 Requested for Shipping Loaf Updated MV & consignee
Arrival Notice
The message has been quarantined as: m/banned-m4_zwt9D5HlL
The message WAS NOT relayed to:
<admin(a)federez.net>:
554 5.7.0 Bounce, id=02535-04 - BANNED: .exe,.exe-ms,2 MEA & EVA COMB SAILING Docs Inv#483099 SKMBT.exe
apticron report [Tue, 23 May 2017 00:38:21 +0200]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
libjbig2dec0 0.13-4~deb8u2
login 1:4.2-3+deb8u4
passwd 1:4.2-3+deb8u4
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour jbig2dec (libjbig2dec0) ---
jbig2dec (0.13-4~deb8u2) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Prevent integer overflow vulnerability (CVE-2017-7885) (Closes: #860460)
* Prevent SEGV due to integer overflow (CVE-2017-7975) (Closes: #860788)
* Bounds check before reading from image source data (CVE-2017-7976)
(Closes: #860787)
-- Salvatore Bonaccorso <carnil(a)debian.org> Tue, 16 May 2017 22:35:00 +0200
--- Modifications pour shadow (login passwd) ---
shadow (1:4.2-3+deb8u4) jessie-security; urgency=high
* Non-maintainer upload by the Security Team.
* Reset pid_child only if waitpid was successful.
This is a regression fix for CVE-2017-2616. If su receives a signal like
SIGTERM, it is not propagated to the child. (Closes: #862806)
-- Salvatore Bonaccorso <carnil(a)debian.org> Wed, 17 May 2017 12:58:54 +0200
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron
This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[2a06:e042:100:4:200:9ff:fe04:1901] said: 550 5.1.0
<root(a)nonagon.crans.org>: Sender address rejected: User unknown in relay
recipient table (in reply to RCPT TO command)