From owner-freebsd-isp Tue Apr 8 07:54:10 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id HAA12048 for isp-outgoing; Tue, 8 Apr 1997 07:54:10 -0700 (PDT) Received: from buffnet4.buffnet.net (buffnet4.buffnet.net [205.246.19.13]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id HAA12043 for ; Tue, 8 Apr 1997 07:54:06 -0700 (PDT) Received: from buffnet1.buffnet.net (mmdf@buffnet1.buffnet.net [205.246.19.10]) by buffnet4.buffnet.net (8.7.5/8.7.3) with SMTP id KAA09439 for ; Tue, 8 Apr 1997 10:54:02 -0400 (EDT) Received: from buffnet11.buffnet.net by buffnet1.buffnet.net id aa25110; 8 Apr 97 10:53 EDT Date: Tue, 8 Apr 1997 10:53:42 -0400 (EDT) From: Steve To: michael@blueneptune.com cc: freebsd-isp@freebsd.org Subject: Re: CERT Advisory on POP server In-Reply-To: <199704080642.XAA16131@rainey.blueneptune.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-isp@freebsd.org X-Loop: FreeBSD.org Precedence: bulk On Mon, 7 Apr 1997 michael@blueneptune.com wrote: > > Does anybody know if qpopper (the Qualcomm POP server) is vulnerable > in a similar fashion? I dunno but qpopper used to leave locks all over the place - I hated it.