[29272] in bugtraq
Re: QPopper 4.0.x buffer overflow vulnerability
daemon@ATHENA.MIT.EDU (Randall Gellens)
Wed Mar 12 12:40:41 2003
Mime-Version: 1.0
Message-Id: <a06000b1eba9453b7f0cc@[129.46.74.134]>
In-Reply-To: <20030310143133.GB1086@dereference.de>
Date: Tue, 11 Mar 2003 19:05:51 -0800
To: Florian Heinz <heinz@cronon-ag.de>, bugtraq@securityfocus.com
From: Randall Gellens <rg_public.1@flagg.qualcomm.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
The first I heard of the problem was this morning. Was any notice
sent to qpopper-bugs@qualcomm.com or qpopper-patches@qualcomm.com in
advance of the posting here? If so, please let me know the details
so I can see what happened to the message. If not, I'd like to know
why.
A fixed Qpopper (version 4.0.5fc2) is available now at
<ftp://ftp.qualcomm.com/eudora/servers/unix/popper/beta/>. I plan on
releasing 4.0.5 final tomorrow unless I hear of any problems with
4.0.5fc2.
--
Randall Gellens
rg_public.1@flagg.qualcomm.com
Opinions are personal; facts are suspect; I speak for myself only