Anyone know of a possible way to close this off in visnetic by a filter? 

 
Dave
 
 -----------------------------------
|Beach Computers                    |
|Affordable Hosting Solutions       |
|http://www.beachcomp.com           |
 ===================================
|Cheap Domain Warehouse             |
|Get Your Own Dot!                  |
|http://www.cheapdomainwarehouse.com|
 ---------------------------------- 

------------------------------------
Disclaimer and confidentiality note:

The contents of this communication are intended/meant only for addressee(s)
and may contain information that is privileged or otherwise confidential.
If you are not the intended recipient you are hereby notified that any
disclosure, copying, distribution or taking any action in reliance on the
contents of this information is strictly prohibited and may be unlawful.
The contents of this e-mail shall not be forwarded to any third party. If
you have received this electronic mail transmission in error, please delete
it from your system without copying or forwarding it, and notify the sender
of the error by reply email, so that the sender's address records
can be corrected.
Views and opinions are solely those of the sender unless clearly indicated
as being that of Beach Computers or any of it's affiliated companies.
Beach Computers cannot assure that the integrity of this communication has
been maintained or that it is free of errors, virus, interception or
interference.

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Grant Griffith
Sent: Friday, October 27, 2006 1:42 PM
To: [email protected]
Subject: RE: [IMail Forum] Update for SMTP vulnerability in 8.22

This is not true!  We have an IMGate solution and were hit this morning by
it.  The had a valid email address in the to field for the email address and
the name associated to it had the code and we were hit with 15,000 emails in
a matter of a little while.  Len just put a header filter in place on the
IMGate to try to stop it.  Note: we patched this morning after realizing we
were hit, therefore are OK now.

Thanks,
Grant Griffith
Web Application Developer
Enhanced Telecommunications
http://www.etczone.com
812-932-1000

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Chris Moody
Sent: Friday, October 27, 2006 12:31 PM
To: [email protected]
Subject: RE: [IMail Forum] Update for SMTP vulnerability in 8.22

ASSP, IMGATE, , Barracuda and Alligate all sit in front of the mail server
and act as a gateway. If you keep your mail server otherwise firewalled and
have one of these products out in front then the vulnerability is mitigated
(from external sources).

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of [EMAIL PROTECTED]
Sent: Friday, October 27, 2006 12:28 PM
To: [email protected]
Subject: RE: [IMail Forum] Update for SMTP vulnerability in 8.22


So am I to understand that ASSP somehow prevents the vulnerabtility from
being a problem?

Mike N
FXOL

To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive:
http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/

To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive:
http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/
To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/




To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/

Reply via email to