I'm willing to help work on this as well. I tested with McAfee. Some of the tests were blocked by MIMEDefang and not McAfee.
Here's the ones that got through both using a modified windows suggested minimum filter. Test #5 Test #13 Test #15 Test #17 Test #18 Test #19 Test #20 Regards, KAM > In a post related to a clamav question, the URL > http://www.testvirus.org/?co= was given. I ran my own server through the > battery of tests on that site. I was hoping the site had some explanations > of the specific vulnerablilities it tries to exploit in tests 16 through 22. > Our system, with MIMEDefang and Vexira did very well overall, but missed > some of the tests in that group. > > It's a given that my Vexira could identify the EICAR, as the success of most > of the tests proved. But it could only scan the peices of the message that > MIMEDefang chose to send to it. > > With good descriptions of the vulnerabilities "exploited" in tests 17, 18, > 19, 20, and 22, it shouldnt be hard to built some checks for these into > mimedefang-filter. > > Does anyone know where good descriptions of these "exploits" might be found? _______________________________________________ Visit http://www.mimedefang.org and http://www.canit.ca MIMEDefang mailing list [EMAIL PROTECTED] http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

