From owner-freebsd-security Thu Apr 10 15:15:16 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id PAA03670 for security-outgoing; Thu, 10 Apr 1997 15:15:16 -0700 (PDT) Received: from rover.village.org (rover.village.org [204.144.255.49]) by freefall.freebsd.org (8.8.5/8.8.5) with SMTP id PAA03663 for ; Thu, 10 Apr 1997 15:15:11 -0700 (PDT) Received: from rover.village.org [127.0.0.1] by rover.village.org with esmtp (Exim 1.60 #1) id 0wFS7R-0002cN-00; Thu, 10 Apr 1997 16:15:01 -0600 To: HawkeWerks Multimedia Subject: Re: qpopper 2.2 and CERT advisory CA-97.09 Cc: freebsd-security@freebsd.org In-reply-to: Your message of "Tue, 08 Apr 1997 10:46:37 CDT." <3.0.1.32.19970408104637.00804100@192.0.2.2> References: <3.0.1.32.19970408104637.00804100@192.0.2.2> Date: Thu, 10 Apr 1997 16:15:01 -0600 From: Warner Losh Message-Id: Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk In message <3.0.1.32.19970408104637.00804100@192.0.2.2> HawkeWerks Multimedia writes: : does anyone know if this vulnerability applies here? or does anyone have : the exploit? I will be glad to test it myself. To the best of my knowledge, qpopper is not vulnerable to the latest problems that the imap advisory is about. Warner