From owner-freebsd-security Sun Jul 19 10:10:00 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id KAA00368 for freebsd-security-outgoing; Sun, 19 Jul 1998 10:10:00 -0700 (PDT) (envelope-from owner-freebsd-security@FreeBSD.ORG) Received: from lariat.lariat.org (ppp1000.lariat.org@[206.100.185.2]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id KAA00363 for ; Sun, 19 Jul 1998 10:09:58 -0700 (PDT) (envelope-from brett@lariat.org) Received: (from brett@localhost) by lariat.lariat.org (8.8.8/8.8.8) id LAA28734; Sun, 19 Jul 1998 11:09:43 -0600 (MDT) Message-Id: <199807191709.LAA28734@lariat.lariat.org> X-Sender: brett@mail.lariat.org X-Mailer: QUALCOMM Windows Eudora Pro Version 4.0.1 Date: Sun, 19 Jul 1998 11:09:40 -0600 To: security@FreeBSD.ORG From: Brett Glass Subject: Why is there no info on the QPOPPER hack? Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Our system has been penetrated via a buffer overflow exploit in Qualcomm's QPOPPER, as obtained from the FreeBSD ports library. But there's no advisory about this on FreeBSD's site.... In fact, we learned of the exploit only because the cracker was sloppy. We need advice on resecuring the system and preventing future incidents of this kind. CERT has been utterly unresponsive; they seem to have ignored our two e-mails asking for help. Any help we can get from members of the FreeBSD community would be MUCH appreciated. --Brett Glass To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe security" in the body of the message