Qpopper 4.0.3 **** Fixes Buffer Overflow **** (fwd)

From: Michael Brennen (mbrennenat_private)
Date: Sat Jun 02 2001 - 08:37:44 PDT

  • Next message: Luki R .: "man/man-db MANPATH bugs exploit"

    Forwarded from the qpopper list.
    
    ---------- Forwarded message ----------
    Date: Fri, 1 Jun 2001 23:28:20 -0700
    From: Qpopper Support <qpopperat_private>
    To: Qpopper Public List <qpopperat_private>,
         qpopper-announceat_private
    Cc: qpopperat_private
    Subject: Qpopper 4.0.3 **** Fixes Buffer Overflow ****
    
    Qpopper 4.0.3 is available at
    <ftp://ftp.qualcomm.com/eudora/servers/unix/popper/>.
    
    
    **** 4.0.3 FIXES A BUFFER OVERFLOW PRESENT IN ALL VERSIONS OF 4.0 --
    PLEASE UPGRADE IMMEDIATELY ***
    
    
    Changes from 4.0.2 to 4.0.3:
    ----------------------------
      1.  Don't call SSL_shutdown unless we tried to negotiate an
          SSL session.  (As suggested by Kenneth Porter.)
      2.  Fix buffer overflow  (reported by Gustavo Viscaino).
      3.  Fixed empty password treated as empty command (patch
          submitted by Michael Smith and others).
      4.  Added patch by Carles Xavier Munyoz to fix erroneous
          scanning for \n in getline().
      5.  Fix from Arvin Schnell for warnings on 64-bit systems.
      6.  Added patch by Clifton Royston to change error message
          for nonauthfile and authfile tests.
      7.  Added 'uw-kludge' as synonym for 'uw-kluge'.
    



    This archive was generated by hypermail 2b30 : Sat Jun 02 2001 - 09:31:28 PDT