On Tue, Mar 09, 1999 at 11:23:47AM +0300, [EMAIL PROTECTED] wrote:
> On Tue, Mar 09, 1999 at 01:34:36AM +0100, Peter van Dijk wrote:
> 
> [ssnip]
> 
> > > Is qmail-popup (or any other program involved due to qmail's POP3
> > > iterface design) known to be exploitable?
> > 
> > No, DJB's code has always been perfectly exploit-free as far as I know. qmail-popup
> > and qmail-pop3d are in _no_ _way_ related to qpopper.
> 
> [ssnip]
> 
> and the latest betas of qpopper are also exploit-free.

rephrase: no bugs have been found... after the amount of bugs found in previous
qpopper releases, I don't trust it.

Greetz, Peter.
-- 
.| Peter van Dijk           | <mo|VERWEG> stoned worden of coden
.| [EMAIL PROTECTED]  | <mo|VERWEG> dat is de levensvraag
                            | <mo|VERWEG> coden of stoned worden
                            | <mo|VERWEG> stonend worden En coden
                            | <mo|VERWEG> hmm
                            | <mo|VERWEG> dan maar stoned worden en slashdot lezen:)

Reply via email to