Univ. of Washington pop2d Remote File Read Vulnerability

Solution:
Currently the SecurityFocus staff are not ware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

Disabling the ipop2d daemon will eliminate this vulnerability. It is typically executed by inetd, and is configured via the /etc/inetd.conf file.



 

Privacy Statement
Copyright 2010, SecurityFocus