In article <[EMAIL PROTECTED]>,
Mark A. Bialik <[EMAIL PROTECTED]> wrote:
>Be aware that qpopper has been subject to buffer overflow exploits the
>past few days.

And a new qpopper has been in Incoming since Saturday.

>Patches were posted, but today a new series of attacks
>proved the patches worthless.

Not the patch that I wrote and used! I know there still is a small
bug in it, but that is NOT exploitable.

Mike.
-- 
 Miquel van Smoorenburg | Our vision is to speed up time,
    [EMAIL PROTECTED]  |   eventually eliminating it.


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to