From owner-freebsd-questions Tue Aug 5 10:23:14 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id KAA24427 for questions-outgoing; Tue, 5 Aug 1997 10:23:14 -0700 (PDT) Received: from doormat.epower.net (doormat.epower.net [207.16.212.3]) by hub.freebsd.org (8.8.5/8.8.5) with SMTP id KAA24422 for ; Tue, 5 Aug 1997 10:23:04 -0700 (PDT) Received: (from elliots@localhost) by doormat.epower.net (8.6.12/8.6.9) id MAA14405; Tue, 5 Aug 1997 12:28:19 -0500 Date: Tue, 5 Aug 1997 12:28:19 -0500 (EST) From: Elliot Smorodinsky To: freebsd-questions@freebsd.org Subject: Popper question. Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Is FreeBSD's version of popper sucseptible to the attack described in "ftp://info.cert.org/pub/cert_advisories/CA-97.09.imap_pop"? I am one of the system administrators for Eclipse America Corporation, and since one of our mailservers runs FreeBSD (runs an entirely too old version of freebsd, but that's neither here nor there), I'm quite understandably concerned. Thank you very much, and I look fdorward to hearing from you. --Elliot Smorodinsky