From owner-freebsd-security Tue Apr 8 11:48:45 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id LAA23379 for security-outgoing; Tue, 8 Apr 1997 11:48:45 -0700 (PDT) Received: from sakaki.communique.net (sakaki.Communique.Net [204.27.65.7]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id LAA23372 for ; Tue, 8 Apr 1997 11:48:43 -0700 (PDT) Received: from hawke (066.btr2.Communique.Net [204.27.124.66]) by sakaki.communique.net (8.8.5/8.8.5) with SMTP id NAA29122 for ; Tue, 8 Apr 1997 13:45:38 -0500 (CDT) Message-Id: <3.0.1.32.19970408104637.00804100@192.0.2.2> X-Sender: hawke#207.55.131.114@192.0.2.2 X-Mailer: Windows Eudora Pro Version 3.0.1 (32) Date: Tue, 08 Apr 1997 10:46:37 -0500 To: freebsd-security@freebsd.org From: HawkeWerks Multimedia Subject: qpopper 2.2 and CERT advisory CA-97.09 Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk -----BEGIN PGP SIGNED MESSAGE----- does anyone know if this vulnerability applies here? or does anyone have the exploit? I will be glad to test it myself. Thanks Lloyd Duhon Vice President, Research and Development Zoron, Inc. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQBVAwUBM0poTbs1iRWteA9hAQHtpQH/ck2SGZ4fImFq1BRKM7aF6KVr9nAbrFNT X64cmbvENUuR5yTy9n3F4wIWwnmn3aFDSR/JyANWg0g7dvWPHUaUmA== =OCRK -----END PGP SIGNATURE----- Hawke http://www.hawkewerks.com/ hawke@hawkewerks.com PGP Mail Preferred! -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQBNAzJ9SkAAAAECANxvu4wZLgc/igkNRcANpiSxFHn3IdDULwyQY1oG3ktdSnEq v0XMMN4gOKmYKRK1Zxg9PGP8UyRouzWJFa14D2EABRG0LEhhd2tlV2Vya3MgTXVs dGltZWRpYSA8aGF3a2VAaGF3a2V3ZXJrcy5jb20+iQBVAwUQMn1KiLs1iRWteA9h AQHqWQIAzUD6GYD6YR7UURHZrooIb5pD3c4T4pNT7SEVFMmmB+AV9yq1pBHoK6Mf sKjCy2QhQEEdL1+rOSnmuUZIMJpkNw== =3L3b -----END PGP PUBLIC KEY BLOCK-----