So Ipswitch has let ALL of their customers sit vulnerable regardless of having an SA?
 
Someone from Ipswitch really needs to inform us all of the situation and EXACTLY when it will be corrected.

Bill Foresman
Matrosity Hosting
www.matrosity.com
850.656.2644

 


From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Troy D. Hilton
Sent: Thursday, October 26, 2006 1:04 PM
To: Imail_Forum@list.ipswitch.com
Subject: RE: [IMail Forum] SMTP Exploit Scanning Going on NOW

From what I understand both 8.2x and 2006 are vulnerable. Check here: http://www.securiteam.com/exploits/6G00L0KH5E.html

 

Troy D. Hilton

Serveon, Inc.

302-529-8640

[EMAIL PROTECTED]


From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matrosity Hosting
Sent: Thursday, October 26, 2006 12:49 PM
To: Imail_Forum@list.ipswitch.com
Subject: RE: [IMail Forum] SMTP Exploit Scanning Going on NOW

 

which version of 2006 is not open to this?

 

Bill Foresman
Matrosity Hosting
www.matrosity.com
850.656.2644

 

 


From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Mike N
Sent: Thursday, October 26, 2006 12:42 PM
To: Imail_Forum@list.ipswitch.com
Subject: Re: [IMail Forum] SMTP Exploit Scanning Going on NOW

Well, that answers that question - a client running 8.22 just had an SMTP crash.   Therefor 8.22 must be vulnerable.  Successful payload delivery - who knows? [ They have an SA and are still in the final stages of moving to 2006 ].

 

----- Original Message -----

Sent: Thursday, October 26, 2006 11:34 AM

Subject: [IMail Forum] SMTP Exploit Scanning Going on NOW

 

Heads up everyone. My IDS systems are reporting heavy scanning for the IMail SMTP exploit. 

 

Reply via email to