So am I to understand that ASSP somehow prevents the vulnerabtility from
being a problem?
With the recent report of the exploit getting through IMGate, this is still
a good question. Is there anybody using ASSP directly in front of IMail,
that has suffered from this exploit? Will the delaying option in ASSP be a
sufficient deterrent? Assuming the exploit uses a valid recipient and
passes all ASSP connection tests, will the malicious rcpt command be passed
unmolested from ASSP to Imail? Does anyone have a record of a successful
exploit or exploit attempt that we could use to generate a blocking filter?
Thanks,
Doug Traylor
MIS Department
Harbison-Fischer Mfg. Co.
To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/