[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[cobalt-security] Qpopper 4.0.3 **** Fixes Buffer Overflow **** (fwd)



Is this related to us?
[shimi@www shimi]$ rpm -q qpopper
qpopper-3.0.2-C6

I believe I have all the patches.

- shimi

---------- Forwarded message ----------
To: bugtraq@xxxxxxxxxxxxxxxxx
Subject: Qpopper 4.0.3 **** Fixes Buffer Overflow **** (fwd)

Forwarded from the qpopper list.

---------- Forwarded message ----------
Date: Fri, 1 Jun 2001 23:28:20 -0700
From: Qpopper Support <qpopper@xxxxxxxxxxxx>
To: Qpopper Public List <qpopper@xxxxxxxxxxxxxxxxx>,
     qpopper-announce@xxxxxxxxxxxxxxxxxx
Cc: qpopper@xxxxxxxxxxxx
Subject: Qpopper 4.0.3 **** Fixes Buffer Overflow ****

Qpopper 4.0.3 is available at
<ftp://ftp.qualcomm.com/eudora/servers/unix/popper/>.


**** 4.0.3 FIXES A BUFFER OVERFLOW PRESENT IN ALL VERSIONS OF 4.0 --
PLEASE UPGRADE IMMEDIATELY ***


Changes from 4.0.2 to 4.0.3:
----------------------------
  1.  Don't call SSL_shutdown unless we tried to negotiate an
      SSL session.  (As suggested by Kenneth Porter.)
  2.  Fix buffer overflow  (reported by Gustavo Viscaino).
  3.  Fixed empty password treated as empty command (patch
      submitted by Michael Smith and others).
  4.  Added patch by Carles Xavier Munyoz to fix erroneous
      scanning for \n in getline().
  5.  Fix from Arvin Schnell for warnings on 64-bit systems.
  6.  Added patch by Clifton Royston to change error message
      for nonauthfile and authfile tests.
  7.  Added 'uw-kludge' as synonym for 'uw-kluge'.