Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 28 Jun 1998 09:10:10 +0930
From:      Greg Lehey <grog@lemis.com>
To:        Jason Godsey <godsey@godsey.net>, isp@FreeBSD.ORG
Cc:        current@FreeBSD.ORG
Subject:   qpopper compromise (was: !!! FLASH TRAFFIC !!! QPOPPER REMOTE ROOT EXPLOIT (fwd))
Message-ID:  <19980628091010.O23035@freebie.lemis.com>
In-Reply-To: <Pine.BSF.3.96.980627051733.18856A-100000@shaw.fidalgo.net>; from Jason Godsey on Sat, Jun 27, 1998 at 05:17:48AM -0700
References:  <Pine.BSF.3.96.980627051733.18856A-100000@shaw.fidalgo.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Saturday, 27 June 1998 at  5:17:48 -0700, Jason Godsey wrote:
> --
> Jason Godsey - godsey@godsey.net - http://www.godsey.net/
> 
> ---------- Forwarded message ----------
> Date: Sat, 27 Jun 1998 00:58:24 -0400
> From: Seth McGann <smm@WPI.EDU>
> To: BUGTRAQ@NETSPACE.ORG
> Subject: !!! FLASH TRAFFIC !!! QPOPPER REMOTE ROOT EXPLOIT

I nearly deleted this one because it looked like spam...

> Its come to my attention that systems around the internet are being
> exploited using a new remote overflow in Qualcomm's Popper server.  Well,
> lets clear a few things up:
> 
> 1.  The working exploit was stolen from my development account,
> subsequently MANY sites were cracked in short order.  Much of Efnet was
> compromised as power crazed script kiddies gained root access on IRCOP
> boxes, giving themselves O-lines.

A fix has been committed to the port.  Download it and rebuild the
port if you're interested.

Greg
-- 
See complete headers for address and phone numbers
finger grog@lemis.com for PGP public key

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19980628091010.O23035>