Date: Mon, 20 Jul 1998 17:02:36 -0700 (PDT) From: Doug White <dwhite@resnet.uoregon.edu> To: Val <val@hcol.net> Cc: freebsd-questions@FreeBSD.ORG Subject: Re: Off topic - popper security Message-ID: <Pine.BSF.4.00.9807201701430.16885-100000@resnet.uoregon.edu> In-Reply-To: <Pine.BSF.3.96.980720155107.28050A-100000@ns.hcol.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 20 Jul 1998, Val wrote: > This message probably doesn't belong to this list, but since i run freebsd > and complided popper as part of it, it would be interesting what you > think. Today i got a call from a concerned individual who is alleging > that trough the /usr/local/libexec/popper one can get into the system. That is correct. There are known exploits in popper. I suggest upgrading to the latest version and/or switching to a different POP server. Qualcomm has issued fixed versions. Doug White | University of Oregon Internet: dwhite@resnet.uoregon.edu | Residence Networking Assistant http://gladstone.uoregon.edu/~dwhite | Computer Science Major To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.00.9807201701430.16885-100000>
