Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 20 Jul 1998 16:29:40 -0500 (CDT)
From:      Val <val@hcol.net>
To:        freebsd-questions@FreeBSD.ORG
Subject:   Off topic - popper security
Message-ID:  <Pine.BSF.3.96.980720155107.28050A-100000@ns.hcol.net>

next in thread | raw e-mail | index | archive | help
This message probably doesn't belong to this list, but since i run freebsd
and complided popper as part of it, it would be interesting what you
think.  Today i got a call from a concerned individual who is alleging
that trough the /usr/local/libexec/popper one can get into the system.

Indicator is the syslog entry like this:

Jul 20 11:23:33 ns popper[23620]: @ip250.white-plains3.ny.pub-ip.psi.net:
-ERR POP EOF received
ns popper[23623]: @ip250.white-plains3.ny.pub-ip.psi.net: -ERR Unknown
command: "^P^P^P^P^P^P^P^P^P^P...many times ^P^P^P^P^P^P^P"

Did anyone hear about this problem?  What is the usual way for resolving
these other than learning C and looking in the source code?
thanks.
Val.



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980720155107.28050A-100000>