aboutsummaryrefslogtreecommitdiffstats
path: root/mail/popper
diff options
context:
space:
mode:
authormarcus <marcus@FreeBSD.org>2003-12-12 00:49:26 +0800
committermarcus <marcus@FreeBSD.org>2003-12-12 00:49:26 +0800
commit4c64c1dcf8756eaa0048369345badc9a32353b38 (patch)
treebe7e0020b26b4df3d3f8cd9d00ec8c7eb3e80d2e /mail/popper
parentfc3ebe3cf46ec15e03e90e3ee8f6ed91843f2e35 (diff)
downloadfreebsd-ports-gnome-4c64c1dcf8756eaa0048369345badc9a32353b38.tar.gz
freebsd-ports-gnome-4c64c1dcf8756eaa0048369345badc9a32353b38.tar.zst
freebsd-ports-gnome-4c64c1dcf8756eaa0048369345badc9a32353b38.zip
With my portmgr hat on, mark this port FORBIDDEN as it contains a remotely
exploitable privilege escalation vulnerability. See http://www.eudora.com/qpopper/#BUFFER for more details. Reported by: kensmith
Diffstat (limited to 'mail/popper')
-rw-r--r--mail/popper/Makefile4
1 files changed, 4 insertions, 0 deletions
diff --git a/mail/popper/Makefile b/mail/popper/Makefile
index 504c347fcaae..bae23d257a72 100644
--- a/mail/popper/Makefile
+++ b/mail/popper/Makefile
@@ -16,6 +16,10 @@ EXTRACT_SUFX= .tar.Z
MAINTAINER= ache@freebsd.org
COMMENT= Berkeley POP 3 server (now maintained by Qualcomm)
+# See http://www.eudora.com/qpopper/#BUFFER for more details on this
+# vulnerability.
+FORBIDDEN= "Contains a privilege escalation vulnerability"
+
# Set WITH_POPPER_YOUBIN_SUPPORT variable in the environment to enable
# youbin support.
#