[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [cobalt-security] QPopper 4.0.x buffer overflow vulnerability
- Subject: RE: [cobalt-security] QPopper 4.0.x buffer overflow vulnerability
- From: paul jacobs <paul@xxxxxxxxxxxxxxxxxx>
- Date: Wed, 12 Mar 2003 09:40:59 -0800
- List-id: Mailing list for users to address network security on Cobalt products. <cobalt-security.list.cobalt.com>
At 08:57 AM 3/12/2003, you wrote:
Not those of us running 4.0.4 compliments of:
http://www.solarspeed.net/downloads/index.php
But thanks for pointing that out.
Ahh cool!!... are sure about this?
-----Original Message-----
From: Graeme Fowler [mailto:graeme.fowler@xxxxxxxxxxxxxx]
Sent: Wednesday, March 12, 2003 10:44 AM
To: cobalt-security@xxxxxxxxxxxxxxx
Subject: RE: [cobalt-security] QPopper 4.0.x buffer overflow
vulnerability
Matthew Goade wrote:
> hmmm.
...after reading an alert on the bugtraq list.
> Subject: QPopper 4.0.x buffer overflow vulnerability
...good job Cobalt still use qpopper version 3, is it not?
Regards
Graeme Fowler
Team Leader - Nottingham
Technical Services
Best Regards,
Paul Jacobs / SR. Network Manager
Microsoft MCP 2000 / Cisco Certified
Design / Install / Troubleshoot / Optimize /
Security of WANs / LANs / Data Recovery
Mon. - Fri. 9AM - 5PM (619)336-1400
http://www.adv-data.com