Date: Sun, 28 Jun 1998 09:10:10 +0930 From: Greg Lehey <grog@lemis.com> To: Jason Godsey <godsey@godsey.net>, isp@FreeBSD.ORG Cc: current@FreeBSD.ORG Subject: qpopper compromise (was: !!! FLASH TRAFFIC !!! QPOPPER REMOTE ROOT EXPLOIT (fwd)) Message-ID: <19980628091010.O23035@freebie.lemis.com> In-Reply-To: <Pine.BSF.3.96.980627051733.18856A-100000@shaw.fidalgo.net>; from Jason Godsey on Sat, Jun 27, 1998 at 05:17:48AM -0700 References: <Pine.BSF.3.96.980627051733.18856A-100000@shaw.fidalgo.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Saturday, 27 June 1998 at 5:17:48 -0700, Jason Godsey wrote: > -- > Jason Godsey - godsey@godsey.net - http://www.godsey.net/ > > ---------- Forwarded message ---------- > Date: Sat, 27 Jun 1998 00:58:24 -0400 > From: Seth McGann <smm@WPI.EDU> > To: BUGTRAQ@NETSPACE.ORG > Subject: !!! FLASH TRAFFIC !!! QPOPPER REMOTE ROOT EXPLOIT I nearly deleted this one because it looked like spam... > Its come to my attention that systems around the internet are being > exploited using a new remote overflow in Qualcomm's Popper server. Well, > lets clear a few things up: > > 1. The working exploit was stolen from my development account, > subsequently MANY sites were cracked in short order. Much of Efnet was > compromised as power crazed script kiddies gained root access on IRCOP > boxes, giving themselves O-lines. A fix has been committed to the port. Download it and rebuild the port if you're interested. Greg -- See complete headers for address and phone numbers finger grog@lemis.com for PGP public key To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19980628091010.O23035>