Date: Fri, 29 Sep 2000 15:51:15 -0700 From: Kris Kennaway <kris@FreeBSD.org> To: Roman Shterenzon <roman@xpert.com> Cc: Kris Kennaway <kris@FreeBSD.org>, security@freebsd.org Subject: Re: cvs commit: ports/mail/pine4 Makefile (fwd) Message-ID: <20000929155115.A6456@freefall.freebsd.org> In-Reply-To: <Pine.LNX.4.10.10009291755520.17656-100000@jamus.xpert.com>; from roman@xpert.com on Sat, Sep 30, 2000 at 02:41:30AM %2B0200 References: <Pine.BSF.4.21.0009290030170.63575-100000@freefall.freebsd.org> <Pine.LNX.4.10.10009291755520.17656-100000@jamus.xpert.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Sep 30, 2000 at 02:41:30AM +0200, Roman Shterenzon wrote: > Perhaps I'll move to mutt, the same command gives only 92 occurrences :) > Mutt on the other hand has sgid binary installed.. I haven't looked at mutt yet - of course, just grepping for functions is a poor indicator of the security of a program, but in the case of pine it is so blatant (and the authors have a bad enough track record) as to leave little doubt there are others which are remotely exploitable aside from the currently known exploitable ones. Kris -- In God we Trust -- all others must submit an X.509 certificate. -- Charles Forsythe <forsythe@alum.mit.edu> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000929155115.A6456>