Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 29 Jun 1998 13:42:47 -0600 (MDT)
From:      Sasha Egan <wildcard@dax.belen.k12.nm.us>
To:        brian@FreeBSD.ORG
Cc:        freebsd-questions@FreeBSD.ORG
Subject:   Remote exploit in qpopper.
Message-ID:  <Pine.BSF.3.96.980629133325.28479A-100000@dax.belen.k12.nm.us>

next in thread | raw e-mail | index | archive | help

Hey Brian, 
I dunno if you have been watching some of the lists but there is some
definate problems in Qualcom's popper...
There have been so many diffrent exploits found in such a short period of
time that even if I had installed a patch I would still be vulnerable.  I
would very much like your advice as well as any advice from people who are
addressing the issue as to what to do to cover ALL the holes that are
known in the popper program.  Is FreeBSD going to make a patch available
that will patch all the holes it they exists or am I going to have to do
this penny-anny, one patch at a time.

Just a suggestion to all that have not heard about this problem...I would
disable the popper program until all problems have been addressed...I have
been compromised ( my system) once already and I hope to God that the
script kiddie didn't know how to edit kernel code or I am toast.

Thanks Brian.

Sasha Egan
Belen Consolidated Schools
Belen, NM 
(505) 861-4981
pager: (505) 875-8866




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980629133325.28479A-100000>