On Mon, Mar 08, 1999 at 09:33:08PM +0100, Matthias Pigulla wrote:
> Hi folks,
> 
> In http://www.cert.org/advisories/CA-98.08.qpopper_vul.html you will
> read "CERT Coordination Center has received reports of buffer overflow
> vulnerabilities in some POP servers based on QUALCOMM's qpopper."
> 
> Is qmail-popup (or any other program involved due to qmail's POP3
> iterface design) known to be exploitable?

No, DJB's code has always been perfectly exploit-free as far as I know. qmail-popup
and qmail-pop3d are in _no_ _way_ related to qpopper.

Greetz, Peter.
-- 
.| Peter van Dijk           | <mo|VERWEG> stoned worden of coden
.| [EMAIL PROTECTED]  | <mo|VERWEG> dat is de levensvraag
                            | <mo|VERWEG> coden of stoned worden
                            | <mo|VERWEG> stonend worden En coden
                            | <mo|VERWEG> hmm
                            | <mo|VERWEG> dan maar stoned worden en slashdot lezen:)

Reply via email to