So am I to understand that ASSP somehow prevents the vulnerabtility from being a problem?

With the recent report of the exploit getting through IMGate, this is still a good question. Is there anybody using ASSP directly in front of IMail, that has suffered from this exploit? Will the delaying option in ASSP be a sufficient deterrent? Assuming the exploit uses a valid recipient and passes all ASSP connection tests, will the malicious rcpt command be passed unmolested from ASSP to Imail? Does anyone have a record of a successful exploit or exploit attempt that we could use to generate a blocking filter?

Thanks,

Doug Traylor
MIS Department
Harbison-Fischer Mfg. Co.
To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/

Reply via email to