Hi,
 
I'm getting tired about this this issue. In my opinion, the following should be done:
 
Programmer at Ipswitch: Open your visual studio, load the code, find the error and recompile it. I'm sure, that this needs not more than a few hours. Just do it! 
 
Release-Manager at Ipswitch: Zip the file and publish it. No need for fancy setups, no need for long explanations. Just do it! 
 
I really do not understand, why this bug is not already fixed for IMail 8.x and IMail 2006.
 
For other products i received also bugfixes this weel. The average time to fix the problems was 36 hours. So, wake up please.
 
 
--

Mit freundlichen GrĂ¼ssen

--------------------------------------------
Merlin Consulting
Martin Schaible
Bahnhofstrasse 27
CH-8702 Zollikon

Phone:   +41 44 391 30 00
Fax:     +41 44 391 32 49

Mail:    mailto:[EMAIL PROTECTED]
URL:     http://www.merlinconsulting.ch
Support: http://support.merlinconsulting.ch

GPS:     N47 20.235 E8 34.226
--------------------------------------------
News - Neue Produkte:

.:. mxGuard - InvURIBL - MessageSniffer
.:. NOD32 Antivirus System
.:. BlueDragon
.:. Kiwi Syslog Monitor
.:. Paessler GmbH
.:. SmarterTools
--------------------------------------------
 


Von: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Im Auftrag von Mike N
Gesendet: Donnerstag, 26. Oktober 2006 18:42
An: Imail_Forum@list.ipswitch.com
Betreff: Re: [IMail Forum] SMTP Exploit Scanning Going on NOW

Well, that answers that question - a client running 8.22 just had an SMTP crash.   Therefor 8.22 must be vulnerable.  Successful payload delivery - who knows? [ They have an SA and are still in the final stages of moving to 2006 ].
 
----- Original Message -----
Sent: Thursday, October 26, 2006 11:34 AM
Subject: [IMail Forum] SMTP Exploit Scanning Going on NOW

Heads up everyone. My IDS systems are reporting heavy scanning for the IMail SMTP exploit. 
 

Reply via email to