Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 30 May 2000 01:51:50 -0700 (PDT)
From:      Kris Kennaway <kris@FreeBSD.org>
To:        sen_ml@eccosys.com
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: QPOPPER: Remote gid mail exploit
Message-ID:  <Pine.BSF.4.21.0005300147400.72232-100000@freefall.freebsd.org>
In-Reply-To: <20000530165232H.1001@eccosys.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 30 May 2000 sen_ml@eccosys.com wrote:

> i'm a bit confused here -- does this mean the current port is still
> vulnerable or that the port available at the time of the exploit
> announcement happened to be hard to exploit?

The latter. It was fixed on FreeBSD on 2000/05/25 - an advisory is
forthcoming.

Kris

----
In God we Trust -- all others must submit an X.509 certificate.
    -- Charles Forsythe <forsythe@alum.mit.edu>



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0005300147400.72232-100000>