Doug Traylor wrote: > New and old versions of Imail Server have an exploit (mentioned below) that > they (Ipswitch) are not going to fix on older versions, that I think ASSP > will help to prevent. >
This might be out of scope, but lets see what we can determine. > *** If the attacker was able to get through ASSP's delaying and other > connection tests, would Imail still be vulnerable? > Certainly. It is only proxy-ing the communication. > *** I have an AV gateway after ASSP so my Imail is not reachable directly > from the internet, but for those that do not would ASSP block this kind of > exploit? Does the fact that ASSP is a proxy and not a gateway mean that the > Imail smtp service is directly accessible from the internet, sort of? Yes, it is. But, seeing that this is a RCPT-related exploit, this may be filterable via the bombHeaderRe. All of your RCPT-related options via ASSP are listed here: http://www.asspsmtp.org/wiki/Processing_Order#Recipient_Information_.28RCPT.29 That's my take on it. HTH ------------------------------------------------------------------------- Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 _______________________________________________ Assp-user mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/assp-user
