Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 20 Jul 1998 17:02:36 -0700 (PDT)
From:      Doug White <dwhite@resnet.uoregon.edu>
To:        Val <val@hcol.net>
Cc:        freebsd-questions@FreeBSD.ORG
Subject:   Re: Off topic - popper security
Message-ID:  <Pine.BSF.4.00.9807201701430.16885-100000@resnet.uoregon.edu>
In-Reply-To: <Pine.BSF.3.96.980720155107.28050A-100000@ns.hcol.net>

next in thread | previous in thread | raw e-mail | index | archive | help

On Mon, 20 Jul 1998, Val wrote:

> This message probably doesn't belong to this list, but since i run freebsd
> and complided popper as part of it, it would be interesting what you
> think.  Today i got a call from a concerned individual who is alleging
> that trough the /usr/local/libexec/popper one can get into the system.

That is correct.  There are known exploits in popper.  I suggest upgrading
to the latest version and/or switching to a different POP server.
Qualcomm has issued fixed versions.

Doug White                              | University of Oregon  
Internet:  dwhite@resnet.uoregon.edu    | Residence Networking Assistant
http://gladstone.uoregon.edu/~dwhite    | Computer Science Major


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.00.9807201701430.16885-100000>