First, thanks very much, as others have said, for the thorough and 
thoughtful way you handled this situation.

> Plugins Compromise
> - ------------------
> During the initial announcement, we'd mentioned that we did not
> believe that any of the plugins had been compromised.  Further
> investigation has shown that the following plugins were indeed
> compromised:
> 
>   - sasql-3.2.0
>   - multilogin-2.4-1.2.9
>   - change_pass-3.0-1.4.0
> 
> Parts of these code changes attempts to send mail to an offsite
> server containing passwords.  We cannot establish a timeline of when
> these plugins were compromised.

Are you able to ascertain whether only that version of Change Password 
was compromised? I'm using Change Password 2.7a-1.4.x - although I don't 
know when I downloaded it, it was before version 3 was released - should 
I be concerned about its integrity? Is there a specific place I could 
look in its code for a possible exploit?

I just want to be able to notify users if in fact there may have been a 
risk of passwords being compromised.

Thanks,
Jim

------------------------------------------------------------------------------
Let Crystal Reports handle the reporting - Free Crystal Reports 2008 30-Day 
trial. Simplify your report design, integration and deployment - and focus on 
what you do best, core application coding. Discover what's new with 
Crystal Reports now.  http://p.sf.net/sfu/bobj-july
-----
squirrelmail-users mailing list
Posting guidelines: http://squirrelmail.org/postingguidelines
List address: [email protected]
List archives: http://news.gmane.org/gmane.mail.squirrelmail.user
List info (subscribe/unsubscribe/change options): 
https://lists.sourceforge.net/lists/listinfo/squirrelmail-users

Reply via email to