Messaging Gateway for Service Providers 10.6 patch 259 release notification

book

Article ID: 185123

calendar_today

Updated On:

Products

Messaging Gateway for Service Providers

Issue/Introduction

This patch for Symantec Messaging Gateway for Service Providers (SMG-SP) 10.6 addresses SYM-015.

This vulnerability impacts all versions of SMG-SP prior to version 10.6 patch 259.

Please see the SYM16-015 security advisory for more information - https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160919_00

Resolution

For SMG-SP 10.6, please download and apply the attached patch for your installation and ensure that the file checksums match those in the patch release notes.

Installation instructions for Linux / Solaris

  1. cd to the LOADPOINT (refer to <loadpoint> in bmiconfig.xml for LOADPOINT).
  2. Download the patch file to the LOADPOINT.
  3. Stop the Brightmail Scanner.
  4.    # /etc/init.d/mailwall stop
  5. Uncompress the patch file.
  6.    # gunzip smg-sp_106_p259_linux64.tgz
  7. Extract the file 'patchinstall' from the .tar file.
  8.    # tar xf smg-sp_106_p259_linux64.tar patchinstall
  9. Set file permissions on patchinstall
  10.    # chmod a+x patchinstall
  11. Run the patchinstall script.
  12.    # ./patchinstall smg-sp_106_p259_linux64.tar
  13. Restart the Brightmail Scanner.
  14.    # /etc/init.d/mailwall start

Installation instructions for Windows

  1. Download the patch file to the target host;
  2. Open the zip file and verify the content matches the list of files for this patch;
  3. Locate your installation LOADPOINT (refer to <loadpoint> in bmiconfig.xml for LOADPOINT);
  4. Stop the Brightmail Conduit and the Brightmail Server using the Windows Services Management Console;
  5. Copy and save the LOADPOINT\Bin directory to create a backup;
  6. Extract the content of the zip file into LOADPOINT\Bin;

Start the Brightmail Conduit and the Brightmail Server using the Windows Services Management Console.