Anyone know of a possible way to close this off in visnetic by a filter?
Dave ----------------------------------- |Beach Computers | |Affordable Hosting Solutions | |http://www.beachcomp.com | =================================== |Cheap Domain Warehouse | |Get Your Own Dot! | |http://www.cheapdomainwarehouse.com| ---------------------------------- ------------------------------------ Disclaimer and confidentiality note: The contents of this communication are intended/meant only for addressee(s) and may contain information that is privileged or otherwise confidential. If you are not the intended recipient you are hereby notified that any disclosure, copying, distribution or taking any action in reliance on the contents of this information is strictly prohibited and may be unlawful. The contents of this e-mail shall not be forwarded to any third party. If you have received this electronic mail transmission in error, please delete it from your system without copying or forwarding it, and notify the sender of the error by reply email, so that the sender's address records can be corrected. Views and opinions are solely those of the sender unless clearly indicated as being that of Beach Computers or any of it's affiliated companies. Beach Computers cannot assure that the integrity of this communication has been maintained or that it is free of errors, virus, interception or interference. -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Grant Griffith Sent: Friday, October 27, 2006 1:42 PM To: [email protected] Subject: RE: [IMail Forum] Update for SMTP vulnerability in 8.22 This is not true! We have an IMGate solution and were hit this morning by it. The had a valid email address in the to field for the email address and the name associated to it had the code and we were hit with 15,000 emails in a matter of a little while. Len just put a header filter in place on the IMGate to try to stop it. Note: we patched this morning after realizing we were hit, therefore are OK now. Thanks, Grant Griffith Web Application Developer Enhanced Telecommunications http://www.etczone.com 812-932-1000 -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Chris Moody Sent: Friday, October 27, 2006 12:31 PM To: [email protected] Subject: RE: [IMail Forum] Update for SMTP vulnerability in 8.22 ASSP, IMGATE, , Barracuda and Alligate all sit in front of the mail server and act as a gateway. If you keep your mail server otherwise firewalled and have one of these products out in front then the vulnerability is mitigated (from external sources). -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of [EMAIL PROTECTED] Sent: Friday, October 27, 2006 12:28 PM To: [email protected] Subject: RE: [IMail Forum] Update for SMTP vulnerability in 8.22 So am I to understand that ASSP somehow prevents the vulnerabtility from being a problem? Mike N FXOL To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/ To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/ To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/ To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/
