-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

is there any more information on this "potential" remote vulnerability?

fetchmail-6.1.0 (Sun Sep 22 18:31:23 EDT 2002), 21999 lines:

* Updated French translation.
* Stefan Esser's fix for potential remote vulnerability in multidrop mode.
This is an important security fix!

-----BEGIN PGP SIGNATURE-----
Version: Hush 2.1
Note: This signature can be verified at https://www.hushtools.com

wloEARECABoFAj2PTckTHG11dGV4QGh1c2htYWlsLmNvbQAKCRBLR9YdGwjQEGCjAJ9j
dQWGysbUyLbds8ov0c7trraFswCfSoAdWbhdWhiLD+QJTYnJBRZpz3Q=
=LBY3
-----END PGP SIGNATURE-----




Get your free encrypted email at https://www.hushmail.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to