Date: Mon, 29 Jun 1998 13:42:47 -0600 (MDT) From: Sasha Egan <wildcard@dax.belen.k12.nm.us> To: brian@FreeBSD.ORG Cc: freebsd-questions@FreeBSD.ORG Subject: Remote exploit in qpopper. Message-ID: <Pine.BSF.3.96.980629133325.28479A-100000@dax.belen.k12.nm.us>
next in thread | raw e-mail | index | archive | help
Hey Brian, I dunno if you have been watching some of the lists but there is some definate problems in Qualcom's popper... There have been so many diffrent exploits found in such a short period of time that even if I had installed a patch I would still be vulnerable. I would very much like your advice as well as any advice from people who are addressing the issue as to what to do to cover ALL the holes that are known in the popper program. Is FreeBSD going to make a patch available that will patch all the holes it they exists or am I going to have to do this penny-anny, one patch at a time. Just a suggestion to all that have not heard about this problem...I would disable the popper program until all problems have been addressed...I have been compromised ( my system) once already and I hope to God that the script kiddie didn't know how to edit kernel code or I am toast. Thanks Brian. Sasha Egan Belen Consolidated Schools Belen, NM (505) 861-4981 pager: (505) 875-8866 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980629133325.28479A-100000>