Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 11 Mar 2003 17:18:04 -0700
From:      Brett Glass <brett@lariat.org>
To:        Jez Hancock <jez.hancock@munk.nu>, FreeBSD Security List <freebsd-security@FreeBSD.ORG>
Subject:   Re: [heinz@cronon-ag.de: QPopper 4.0.x buffer overflow vulnerability]
Message-ID:  <4.3.2.7.2.20030311171659.03d45ba0@localhost>
In-Reply-To: <20030311212848.GA29347@users.munk.nu>

next in thread | previous in thread | raw e-mail | index | archive | help
At 02:28 PM 3/11/2003, Jez Hancock wrote:
  
>Hi,
>
>Can anyone confirm whether or not the attached vulnerability applies to 
>the qpopper 4.0.4-1 port?

My guess is it does. The only mitigating factor is that the attacker
has to supply a valid user ID and password, which means that the
attack has to be an inside job.

Any word regarding patches from Qualcomm?

--Brett


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.3.2.7.2.20030311171659.03d45ba0>