lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <001101c30eb4$e8cd32d0$0c01010a@myhome.bluedevel.com>
Date: Wed, 30 Apr 2003 11:07:45 +1000
From: "jasonk" <jasonk@...edevel.com>
To: <bugtraq@...urityfocus.com>
Subject: RE: MDaemon SMTP/POP/IMAP server: =>6.0.7: POP remote DoS


Yes, I've a feeling it was supposed to be LESS than 6.0.7?  Someone from
Damage Hacking Group want to clarify?

jasonk

> -----Original Message-----
> From: William Pratt [mailto:wpratt@...apath.net] 
> Sent: Tuesday, 29 April 2003 8:25 AM
> To: 'bugtraq@...urity.nnov.ru'; 'bugtraq@...urityfocus.com'
> Subject: RE: MDaemon SMTP/POP/IMAP server: =>6.0.7: POP remote DoS
> 
> 
> 
> Tested on 6.5.1 on Win2K Server. Does not crash MDaemon and 
> returns a 'no such message' error.
> 
> Sincerely,
> 
> William Pratt
> Unix Systems Engineer
> MegaPath Networks, Inc.
> http://www.megapath.net
> 
> 
> 
> ########################################################*
> #       Damage Hacking Group security advisory
> #                   www.dhgroup.org
> ########################################################*
> #Product: MDaemon SMTP/POP/IMAP server =>v.6.0.7
> #Authors: Alt-N Technologies [www.mdaemon.com]
> #Vulnerability: remote DoS via POP3 service
> ########################################################*
> 
<snip>



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ