Date: Tue, 30 Jun 1998 15:10:00 -0700 (PDT) From: Annelise Anderson <andrsn@andrsn.stanford.edu> To: Johann Visagie <wjv@cityip.co.za> Cc: security@internet.org.za, security@FreeBSD.ORG Subject: Re: New Qpopper released to fix hole Message-ID: <Pine.BSF.3.96.980630150525.6945A-100000@andrsn.stanford.edu> In-Reply-To: <19980630182358.B1060@cityip.co.za>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 30 Jun 1998, Johann Visagie wrote: > > ftp://ftp.qualcomm.com/eudora/servers/unix/popper/qpopper2.5.tar.Z I cvsupped ports and tried to make install qpopper2.5. It cannot find this distfile, which turns out to be in "oldeudora" rather than "eudora". It is also not on ftp.freebsd.org, at least not in the directory where the port tries to find it. Since this vulnerability was announced I have a bunch of messages about people trying to use popper who don't have accounts on my machine (I'm the only person who has an account). Annelise P.S. It installed, but the binary /usr/local/libexec/popper is a different size from the one in the src directory in /usr/ports. I do find that a little odd. > Read the README in the same directory for more info. > > -- V > > Johann Visagie | Email: wjv@CityIP.co.za | Tel: +27 21 419-7878 > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe security" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980630150525.6945A-100000>