Date: Tue, 08 Apr 1997 10:46:37 -0500 From: HawkeWerks Multimedia <hawke@hawkewerks.com> To: freebsd-security@freebsd.org Subject: qpopper 2.2 and CERT advisory CA-97.09 Message-ID: <3.0.1.32.19970408104637.00804100@192.0.2.2>
next in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE----- does anyone know if this vulnerability applies here? or does anyone have the exploit? I will be glad to test it myself. Thanks Lloyd Duhon Vice President, Research and Development Zoron, Inc. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQBVAwUBM0poTbs1iRWteA9hAQHtpQH/ck2SGZ4fImFq1BRKM7aF6KVr9nAbrFNT X64cmbvENUuR5yTy9n3F4wIWwnmn3aFDSR/JyANWg0g7dvWPHUaUmA== =OCRK -----END PGP SIGNATURE----- Hawke http://www.hawkewerks.com/ hawke@hawkewerks.com PGP Mail Preferred! -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQBNAzJ9SkAAAAECANxvu4wZLgc/igkNRcANpiSxFHn3IdDULwyQY1oG3ktdSnEq v0XMMN4gOKmYKRK1Zxg9PGP8UyRouzWJFa14D2EABRG0LEhhd2tlV2Vya3MgTXVs dGltZWRpYSA8aGF3a2VAaGF3a2V3ZXJrcy5jb20+iQBVAwUQMn1KiLs1iRWteA9h AQHqWQIAzUD6GYD6YR7UURHZrooIb5pD3c4T4pNT7SEVFMmmB+AV9yq1pBHoK6Mf sKjCy2QhQEEdL1+rOSnmuUZIMJpkNw== =3L3b -----END PGP PUBLIC KEY BLOCK-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3.0.1.32.19970408104637.00804100>