On Tue, 26 Feb 2002, Jan Patorra wrote:

> hi,
>
> > > i recently ran a nessus (www.nessus.org) test against my xmail
> > > machines... the following was discovered - dunno if you trust the tests
> > > performed. (please notice that there are some duplicate messages
> > > due to the way i ran nessus (enabled all plugins)).
> > >
> > > nevertheless i did a second nessus run with only the xmail test
> > > module enabled (see apop/auth/user issue below) and 2 smtp tests
> > > which deal with the helo issue... i got the same results (albeit 1 of the
> > > vulnerabilities found each, not 4 :)
> > >
> > > could you please tell me your opinion on this davide ? i confess i do
> > > not live very well with those results in mind.... if you need some info
> > > about nessus (in case you never used it) i'll try to provide you with it...
> > > thanks!
> >
> > Ok, maybe this should go in a FAQ. These are bogus results because these
> > softwares simply try to send looong lines to the server and XMail when
> > detects not RFC conformant behavior drops the connection. So these tools
> > think that the server crashed and reports the security hole. While XMail
> > is still running healty.
>
> ok, then this should be sent to the creator of the respecting nessus
> module to remove such faulty reports. thanks!

I did it but basically they've only that stupid way to detect overflows
and i think that thay can do very little about that.




- Davide


-
To unsubscribe from this list: send the line "unsubscribe xmail" in
the body of a message to [EMAIL PROTECTED]
For general help: send the line "help" in the body of a message to
[EMAIL PROTECTED]

Reply via email to