Date: Tue, 30 May 2000 18:08:05 +0900 From: sen_ml@eccosys.com To: freebsd-security@FreeBSD.ORG Subject: Re: QPOPPER: Remote gid mail exploit Message-ID: <20000530180805Y.1001@eccosys.com> In-Reply-To: <Pine.BSF.4.21.0005300147400.72232-100000@freefall.freebsd.org> References: <20000530165232H.1001@eccosys.com> <Pine.BSF.4.21.0005300147400.72232-100000@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
From: Kris Kennaway <kris@FreeBSD.org> Subject: Re: QPOPPER: Remote gid mail exploit Date: Tue, 30 May 2000 01:51:50 -0700 (PDT) Message-ID: <Pine.BSF.4.21.0005300147400.72232-100000@freefall.freebsd.org> > On Tue, 30 May 2000 sen_ml@eccosys.com wrote: > > > i'm a bit confused here -- does this mean the current port is still > > vulnerable or that the port available at the time of the exploit > > announcement happened to be hard to exploit? > > The latter. It was fixed on FreeBSD on 2000/05/25 - an advisory is > forthcoming. aha. thanks for the clarification. p.s. i started to wonder about whether there were any decent alternative pop daemons. anyone have any suggestions? i'd have switched to the pop daemon that comes w/ qmail but i don't want to convert to Maildir just yet. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000530180805Y.1001>