Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 30 May 2000 18:08:05 +0900
From:      sen_ml@eccosys.com
To:        freebsd-security@FreeBSD.ORG
Subject:   Re: QPOPPER: Remote gid mail exploit
Message-ID:  <20000530180805Y.1001@eccosys.com>
In-Reply-To: <Pine.BSF.4.21.0005300147400.72232-100000@freefall.freebsd.org>
References:  <20000530165232H.1001@eccosys.com> <Pine.BSF.4.21.0005300147400.72232-100000@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
From: Kris Kennaway <kris@FreeBSD.org>
Subject: Re: QPOPPER: Remote gid mail exploit
Date: Tue, 30 May 2000 01:51:50 -0700 (PDT)
Message-ID: <Pine.BSF.4.21.0005300147400.72232-100000@freefall.freebsd.org>

> On Tue, 30 May 2000 sen_ml@eccosys.com wrote:
> 
> > i'm a bit confused here -- does this mean the current port is still
> > vulnerable or that the port available at the time of the exploit
> > announcement happened to be hard to exploit?
> 
> The latter. It was fixed on FreeBSD on 2000/05/25 - an advisory is
> forthcoming.

aha.  thanks for the clarification.

p.s. i started to wonder about whether there were any decent
alternative pop daemons.  anyone have any suggestions?  i'd have
switched to the pop daemon that comes w/ qmail but i don't want to
convert to Maildir just yet.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000530180805Y.1001>