I can confirm 6.6c-1 running on SmartOS. (currently mirror slave only, Iíll be upgrading the master shortly if the slave is OK.)
SurgeMail 6.5a-1 and 6.6a-1 Solaris-x64 on SmartOS ARE vulnerable to Heartbleed
SurgeMail 6.6c-1 Solaris-x64 on SmartOS IS NOT vulnerable to Heartbleed
When checking for vulnerabilities, consider the following.
- As ChrisP has mentioned, tellmail status will report the OpenSSL version that is statically linked into SurgeMail. In 6.5a-1 and 6.6a-1 on Solaris-x64 the version is 1.0.1e (known to be vulnerable), on 6.6c-1 the version is 1.0.1g.
- Early reports on the web suggested checking for the vulnerability by running
against the server. This will report (at the beginning of the output) the TLS extensions the server claims to support, e. g. "renegotiate" and perhaps "heartbeat". However, note that running this command agains SurgeMail 6.6a-1 will NOT report support for heartbeat, and yet the server IS vulnerable. I presume that the extension is in fact supported, but not advertised by the server.
If you are unsure whether you are affected, verify, e. g. using the test service at
and UPGRADE NOW if you are. I strongly recommend revoking and re-issuing certs, and would suggest re-issuing all mail passwords. (I will be doing this as time permits.)
Safe computing all, and thanks again to NetWin for geting on top of this immediately.