Subj : Wildcat! OPENSSL Security HotFix:  SSL/TLS MITM vulnerability
To   : All
From : ANDREA SANTOS
Date : Thu Jan 31 2019 07:12 pm

Date: Wed, 25 Jun 2014 12:36:48 -0400
From: ANDREA SANTOS
To: All
Subject: Wildcat! OPENSSL Security HotFix:  SSL/TLS MITM vulnerability
Newsgroups: win.server.program
Message-ID: <[email protected]>
X-Mailer: Wildcat! Interactive Net Server v7.0.454.5
Lines: 36


Wildcat! OPENSSL Security HotFix:  SSL/TLS MITM vulnerability
(CVE-2014-0224)

The AUP has been updated with the latest OPENSSL security hotfix
v1.0.1h

Wildcat! v6.4

For customers running Wildcat! v6.4 AUP, run your AUTOUPDATE to get
the new OPENSSL.ZIP.   You MUST manually unzip this to get the 3 new files
inside the zip.

Wildcat! v7.0 (CATAPULT)

For customers using Catapult, Wildcat! 7.0 AUP (CUP), run your
AUTOUPDATE using the /catapult switch from a DOS command line:

    Autoupdate /catapult

This will automatically give you the new 3 files.   There is no
OPENSSL.ZIP to unzip.  If you see one, it's the old one for the old
v6.4 you had when you updated to v7.0 which, now, no longer provides
the zip.

Note, you can't MIX the two different versions of v6.4 and v7.0
files.   The libeay32.dll, ssleay32.dll, openssl.exe files for
CATAPULT are recompiled using Microsoft VC10.  The ones for the
older v6.4 are compiled with Microsoft VC6 to maintain maximum
compatibility.   DO NOT MIX THEM, if you do, the v6.4 folks will
need to install more Microsoft Run Time Library stuff.


Santronics Software, Inc., 15600 SW 288 St. Suite 306 Homestead, FL 33033
      TEL: 305-248-3204 SALES: 800-845-6944  FAX 305-248-0394
--- Platinum Xpress/Win/WINServer v3.1
* Origin: Prison Board BBS Mesquite Tx  //telnet.RDFIG.NET www. (1:124/5013)