[29272] in bugtraq

home help back first fref pref prev next nref lref last post

Re: QPopper 4.0.x buffer overflow vulnerability

daemon@ATHENA.MIT.EDU (Randall Gellens)
Wed Mar 12 12:40:41 2003

Mime-Version: 1.0
Message-Id: <a06000b1eba9453b7f0cc@[129.46.74.134]>
In-Reply-To: <20030310143133.GB1086@dereference.de>
Date: Tue, 11 Mar 2003 19:05:51 -0800
To: Florian Heinz <heinz@cronon-ag.de>, bugtraq@securityfocus.com
From: Randall Gellens <rg_public.1@flagg.qualcomm.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii" ; format="flowed"

The first I heard of the problem was this morning.  Was any notice 
sent to qpopper-bugs@qualcomm.com or qpopper-patches@qualcomm.com in 
advance of the posting here?  If so, please let me know the details 
so I can see what happened to the message.  If not, I'd like to know 
why.

A fixed Qpopper (version 4.0.5fc2) is available now at 
<ftp://ftp.qualcomm.com/eudora/servers/unix/popper/beta/>.  I plan on 
releasing 4.0.5 final tomorrow unless I hear of any problems with 
4.0.5fc2.

-- 
Randall Gellens
rg_public.1@flagg.qualcomm.com
Opinions are personal;     facts are suspect;     I speak for myself only

home help back first fref pref prev next nref lref last post