Subj : Wildcat! OPENSSL Security HotFix: SSL/TLS MITM vulnerability To : All From : ANDREA SANTOS Date : Thu Jan 31 2019 07:12 pm Date: Wed, 25 Jun 2014 12:36:48 -0400 From: ANDREA SANTOS To: All Subject: Wildcat! OPENSSL Security HotFix: SSL/TLS MITM vulnerability Newsgroups: win.server.program Message-ID: <1403714208.32.0@winserver.com> X-Mailer: Wildcat! Interactive Net Server v7.0.454.5 Lines: 36 Wildcat! OPENSSL Security HotFix: SSL/TLS MITM vulnerability (CVE-2014-0224) The AUP has been updated with the latest OPENSSL security hotfix v1.0.1h Wildcat! v6.4 For customers running Wildcat! v6.4 AUP, run your AUTOUPDATE to get the new OPENSSL.ZIP. You MUST manually unzip this to get the 3 new files inside the zip. Wildcat! v7.0 (CATAPULT) For customers using Catapult, Wildcat! 7.0 AUP (CUP), run your AUTOUPDATE using the /catapult switch from a DOS command line: Autoupdate /catapult This will automatically give you the new 3 files. There is no OPENSSL.ZIP to unzip. If you see one, it's the old one for the old v6.4 you had when you updated to v7.0 which, now, no longer provides the zip. Note, you can't MIX the two different versions of v6.4 and v7.0 files. The libeay32.dll, ssleay32.dll, openssl.exe files for CATAPULT are recompiled using Microsoft VC10. The ones for the older v6.4 are compiled with Microsoft VC6 to maintain maximum compatibility. DO NOT MIX THEM, if you do, the v6.4 folks will need to install more Microsoft Run Time Library stuff. Santronics Software, Inc., 15600 SW 288 St. Suite 306 Homestead, FL 33033 TEL: 305-248-3204 SALES: 800-845-6944 FAX 305-248-0394 --- Platinum Xpress/Win/WINServer v3.1 * Origin: Prison Board BBS Mesquite Tx //telnet.RDFIG.NET www. (1:124/5013) .