my $0.015  (recession and all).
try to read that cucipop code.   ugh.

Quoting Jerry ([EMAIL PROTECTED]):
> my $0.02, replace qpopper w/ cucipop.
> 
> http://freshmeat.net/projects/cucipop/?topic_id=34
> 
> Good luck!
> 
> JR
> 
> At 04:49 PM 3/11/2003, Alan W. Rateliff, II wrote:
> >----- Original Message -----
> >From: "Brad Stockdale" <[EMAIL PROTECTED]>
> >To: "Subscribers of Qpopper" <[EMAIL PROTECTED]>
> >Sent: Tuesday, March 11, 2003 4:45 PM
> >Subject: Re: The Qpopper 4.0.x exploit
> >
> >> Hello all,
> >>
> >>    I'm sure by now you all have heard that there is a Qpopper 4.0.x
> >> exploit going around... (If not, it was posted to bugtraq sometime this
> >> morning I believe -- Should be findable on the bugtraq archives)
> >
> >>    I was just wondering if anyone had a temporary or permanent fix for 
> >the
> >> problem?
> >
> >What really irks me is that we shouldn't have to ask this question.  I 
> >don't
> >know what the order of events are, but it seems to me that this
> >vulnerability was made public with a POC exploit before Qualcomm was given
> >time to inform us and supply a patch.
> >
> >As someone admining a great number of servers running QPopper, I'm more 
> >than
> >a little pissed about this.  I guess having more information would be
> >helpful, but my immediate complaint is founded.
> >
> >>From what I understand, it's mitigated some by requiring a valid username
> >and password.  That eases my worries somewhat.
> >
> >Anyone else?
> >
> >--
> >       Alan W. Rateliff, II        :       RATELIFF.NET
> > Independent Technology Consultant :    [EMAIL PROTECTED]
> >      (Office) 850/350-0260        :  (Mobile) 850/559-0100
> >-------------------------------------------------------------
> >[System Administration][IT Consulting][Computer Sales/Repair]

Reply via email to