From owner-freebsd-questions Tue Aug 5 11:36:29 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id LAA27889 for questions-outgoing; Tue, 5 Aug 1997 11:36:29 -0700 (PDT) Received: from commlitho.com (thor.commlitho.com [207.254.73.2]) by hub.freebsd.org (8.8.5/8.8.5) with SMTP id LAA27884 for ; Tue, 5 Aug 1997 11:36:24 -0700 (PDT) Message-Id: <199708051836.LAA27884@hub.freebsd.org> Received: from [207.254.73.18] by commlitho.com (SMTPD32-3.02) id A2B48FC012C; Tue, 05 Aug 1997 11:36:36 -0700 From: "Patrick Burm" To: "Elliot Smorodinsky" , Subject: Re: Popper question. Date: Tue, 5 Aug 1997 11:35:51 -0700 X-MSMail-Priority: Normal X-Priority: 3 X-Mailer: Microsoft Internet Mail 4.70.1160 MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Sender: owner-freebsd-questions@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk Most people run qpopper AFAIK. The advisory states qpopper is *NOT* vulnerable to this attack > Is FreeBSD's version of popper sucseptible to the attack described > in "ftp://info.cert.org/pub/cert_advisories/CA-97.09.imap_pop"? I am one > of the system administrators for Eclipse America Corporation, and since > one of our mailservers runs FreeBSD (runs an entirely too old version of > freebsd, but that's neither here nor there), I'm quite understandably > concerned.