On Mon, Mar 08, 1999 at 09:33:08PM +0100, Matthias Pigulla wrote:
> Hi folks,
>
> In http://www.cert.org/advisories/CA-98.08.qpopper_vul.html you will
> read "CERT Coordination Center has received reports of buffer overflow
> vulnerabilities in some POP servers based on QUALCOMM's qpopper."
>
> Is qmail-popup (or any other program involved due to qmail's POP3
> iterface design) known to be exploitable?
No, DJB's code has always been perfectly exploit-free as far as I know. qmail-popup
and qmail-pop3d are in _no_ _way_ related to qpopper.
Greetz, Peter.
--
.| Peter van Dijk | <mo|VERWEG> stoned worden of coden
.| [EMAIL PROTECTED] | <mo|VERWEG> dat is de levensvraag
| <mo|VERWEG> coden of stoned worden
| <mo|VERWEG> stonend worden En coden
| <mo|VERWEG> hmm
| <mo|VERWEG> dan maar stoned worden en slashdot lezen:)