Date: Mon, 15 May 2000 09:27:40 -0500 (CDT) From: Visigoth <visigoth@telemere.net> To: freebsd-security@freebsd.org Subject: qpopper discussion on BUGTRAQ Message-ID: <Pine.BSF.4.21.0005150922270.70154-100000@shell.telemere.net>
next in thread | raw e-mail | index | archive | help
Greetings all... I was just curious as to what the freebsd stance on the possible qpopper-2.53 vuln as is being discussed on BUGTRAQ. Has this vuln been tested with the freebsd port? Are there known issues? I am going to (hopefully) be taking a look at the "exploitability" of the freebsd port for qpopper-2.53 but I was wondering if someone had already done all the work. I under stand that the exploit posted on bugtraq would need to be modified, but I am wondering if the security/ports team have taken care of the offending piece of code already (which is so often the case)... Even just a "Blah Blah Blah, NOT vulnerable" would be kewl... Thanks Visigoth Damieon Stark Sr. Unix Systems Administrator visigoth@telemere.net ____________________________________________________________________________ | - M$ Win 2K was built for the internet. | - Unix _BUILT_ the internet. | FreeBSD - The POWER to serve | http://www.freebsd.org your call... | | ---------------------------------------------------------------------------- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0005150922270.70154-100000>