Date: Tue, 11 Mar 2003 17:18:04 -0700 From: Brett Glass <brett@lariat.org> To: Jez Hancock <jez.hancock@munk.nu>, FreeBSD Security List <freebsd-security@FreeBSD.ORG> Subject: Re: [heinz@cronon-ag.de: QPopper 4.0.x buffer overflow vulnerability] Message-ID: <4.3.2.7.2.20030311171659.03d45ba0@localhost> In-Reply-To: <20030311212848.GA29347@users.munk.nu>
next in thread | previous in thread | raw e-mail | index | archive | help
At 02:28 PM 3/11/2003, Jez Hancock wrote: >Hi, > >Can anyone confirm whether or not the attached vulnerability applies to >the qpopper 4.0.4-1 port? My guess is it does. The only mitigating factor is that the attacker has to supply a valid user ID and password, which means that the attack has to be an inside job. Any word regarding patches from Qualcomm? --Brett To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.3.2.7.2.20030311171659.03d45ba0>