Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 15 May 2000 09:27:40 -0500 (CDT)
From:      Visigoth <visigoth@telemere.net>
To:        freebsd-security@freebsd.org
Subject:   qpopper discussion on BUGTRAQ
Message-ID:  <Pine.BSF.4.21.0005150922270.70154-100000@shell.telemere.net>

next in thread | raw e-mail | index | archive | help

Greetings all...

	I was just curious as to what the freebsd stance on the possible
qpopper-2.53 vuln as is being discussed on BUGTRAQ.  Has this vuln been
tested with the freebsd port?  Are there known issues?  I am going to
(hopefully) be taking a look at the "exploitability" of the freebsd port
for qpopper-2.53 but I was wondering if someone had already done all the
work.  I under stand that the exploit posted on bugtraq would need to be
modified, but I am wondering if the security/ports team have taken care of
the offending piece of code already (which is so often the case)...

Even just a 
"Blah Blah Blah, NOT vulnerable"
would be kewl...

Thanks

Visigoth



Damieon Stark
Sr. Unix Systems Administrator
visigoth@telemere.net

____________________________________________________________________________
					|
- M$ Win 2K was built for the internet.	|
- Unix _BUILT_ the internet.		|   FreeBSD - The POWER to serve
					|   http://www.freebsd.org
	your call...			|
					|
----------------------------------------------------------------------------



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0005150922270.70154-100000>