On Tue, Mar 09, 1999 at 11:23:47AM +0300, [EMAIL PROTECTED] wrote:
> On Tue, Mar 09, 1999 at 01:34:36AM +0100, Peter van Dijk wrote:
>
> [ssnip]
>
> > > Is qmail-popup (or any other program involved due to qmail's POP3
> > > iterface design) known to be exploitable?
> >
> > No, DJB's code has always been perfectly exploit-free as far as I know. qmail-popup
> > and qmail-pop3d are in _no_ _way_ related to qpopper.
>
> [ssnip]
>
> and the latest betas of qpopper are also exploit-free.
rephrase: no bugs have been found... after the amount of bugs found in previous
qpopper releases, I don't trust it.
Greetz, Peter.
--
.| Peter van Dijk | <mo|VERWEG> stoned worden of coden
.| [EMAIL PROTECTED] | <mo|VERWEG> dat is de levensvraag
| <mo|VERWEG> coden of stoned worden
| <mo|VERWEG> stonend worden En coden
| <mo|VERWEG> hmm
| <mo|VERWEG> dan maar stoned worden en slashdot lezen:)