> Yes, it is.  But, seeing that this is a RCPT-related exploit, this may
> be filterable via the bombHeaderRe.  All of your RCPT-related options
> via ASSP are listed here:
>
> http://www.asspsmtp.org/wiki/Processing_Order#Recipient_Information_.28RCPT.29


> the attacker has to specify a mail-from and rcpt-to address

Sorry I miss-read the above line and though it was related to the from and 
reply-to not the from and recipient.  Since this particular exploit uses the 
"To" field to pass the code, ASSP's standard recipient validation should 
take care of this without having to do anything in the bombHeaderRe right 
because the MTA is not involved yet right?

Doug Traylor 


-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
Assp-user mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/assp-user

Reply via email to