In article <[EMAIL PROTECTED]>,
Mark A. Bialik <[EMAIL PROTECTED]> wrote:
>Be aware that qpopper has been subject to buffer overflow exploits the
>past few days.
And a new qpopper has been in Incoming since Saturday.
>Patches were posted, but today a new series of attacks
>proved the patches worthless.
Not the patch that I wrote and used! I know there still is a small
bug in it, but that is NOT exploitable.
Mike.
--
Miquel van Smoorenburg | Our vision is to speed up time,
[EMAIL PROTECTED] | eventually eliminating it.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]