From owner-freebsd-security Wed May 24 15: 4:31 2000 Delivered-To: freebsd-security@freebsd.org Received: from mercury.jorsm.com (mercury.jorsm.com [207.112.128.9]) by hub.freebsd.org (Postfix) with ESMTP id 191E437BCBC for ; Wed, 24 May 2000 15:04:28 -0700 (PDT) (envelope-from jer@jorsm.com) Received: by mercury.jorsm.com (Postfix, from userid 1850) id 3AE17E4A22; Wed, 24 May 2000 17:04:24 -0500 (CDT) Received: from localhost (localhost [127.0.0.1]) by mercury.jorsm.com (Postfix) with ESMTP id 310ADE0C01; Wed, 24 May 2000 17:04:24 -0500 (CDT) Date: Wed, 24 May 2000 17:04:24 -0500 (CDT) From: Jeremy Shaffner To: Dmitry Valdov Cc: freebsd-security@FreeBSD.ORG Subject: Re: QPOPPER: Remote gid mail exploit In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org That's what the patch is for. :) On Thu, 25 May 2000, Dmitry Valdov wrote: > Hi! > > oops, sorry. My fault. I've inserted "%s" before PO_SUCCESS, not before > "buffer". > Sorry again. > > Dmitry. > > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message