[15714] in bugtraq

home help back first fref pref prev next nref lref last post

Re: FreeBSD Ports Security Advisory: FreeBSD-SA-00:26.popper

daemon@ATHENA.MIT.EDU (Mike Brown)
Mon Jul 10 15:15:45 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Message-Id:  <20000710164843.11238.qmail@hyperreal.org>
Date:         Mon, 10 Jul 2000 09:48:43 -0700
Reply-To: mike@HYPERREAL.ORG
From: Mike Brown <mike@HYPERREAL.ORG>
To: BUGTRAQ@SECURITYFOCUS.COM

> FreeBSD-SA-00:26
> Topic:          popper port contains remote vulnerability
> Category:       ports
> Module:         popper
> Announced:      2000-07-05
>
> The popper port, version 2.53 and earlier, [is insecure...]
> V.   Solution
> One of the following:
> 1) Upgrade your entire ports collection and rebuild the popper port.
> 2) Deinstall the old package and install a new package [...]
> 3) download a new port skeleton [...] and use it to rebuild the port.
> 4) Use the portcheckout utility to automate option (3) above.

Not sure why this wasn't mentioned, but it should be noted that
Qualcomm's Qpopper 3.x is no longer considered beta, and there is a
FreeBSD port for it: 'popper3', which could be installed instead of
a patched version of 2.53. Version 3.0.2, which the current popper3
port uses, is, I believe, not subject to these vulnerabilities.

References:
 http://www.eudora.com/qpopper/30.html
 http://www.freebsd.org/ports/mail.html

-M.

home help back first fref pref prev next nref lref last post