Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 10 Apr 1997 16:15:01 -0600
From:      Warner Losh <imp@village.org>
To:        HawkeWerks Multimedia <hawke@hawkewerks.com>
Cc:        freebsd-security@freebsd.org
Subject:   Re: qpopper 2.2 and CERT advisory CA-97.09 
Message-ID:  <E0wFS7R-0002cN-00@rover.village.org>
In-Reply-To: Your message of "Tue, 08 Apr 1997 10:46:37 CDT." <3.0.1.32.19970408104637.00804100@192.0.2.2> 
References:  <3.0.1.32.19970408104637.00804100@192.0.2.2>  

next in thread | previous in thread | raw e-mail | index | archive | help
In message <3.0.1.32.19970408104637.00804100@192.0.2.2> HawkeWerks Multimedia writes:
: does anyone know if this vulnerability applies here? or does anyone have
: the exploit? I will be glad to test it myself.

To the best of my knowledge, qpopper is not vulnerable to the latest
problems that the imap advisory is about.

Warner



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?E0wFS7R-0002cN-00>