Doug Traylor wrote:
> New and old versions of Imail Server have an exploit (mentioned below) that 
> they (Ipswitch) are not going to fix on older versions, that I think ASSP 
> will help to prevent.
>   

This might be out of scope, but lets see what we can determine.

> *** If the attacker was able to get through ASSP's delaying and other 
> connection tests, would Imail still be vulnerable?
>   

Certainly.  It is only proxy-ing the communication.

> *** I have an AV gateway after ASSP so my Imail is not reachable directly 
> from the internet, but for those that do not would ASSP block this kind of 
> exploit?  Does the fact that ASSP is a proxy and not a gateway mean that the 
> Imail smtp service is directly accessible from the internet, sort of?

Yes, it is.  But, seeing that this is a RCPT-related exploit, this may 
be filterable via the bombHeaderRe.  All of your RCPT-related options 
via ASSP are listed here:

   
http://www.asspsmtp.org/wiki/Processing_Order#Recipient_Information_.28RCPT.29

That's my take on it.  HTH


-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
Assp-user mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/assp-user

Reply via email to