Bugtraq mailing list archives
Update - Seattle Lab Slmail v2.5 for NT vulnerable
From: dleblanc () ISS NET (David LeBlanc)
Date: Thu, 16 Oct 1997 12:11:58 -0400
Earlier this week, I reported that Slmail v2.5 is vulnerable to a denial of service attack on the POP3 port. Mr. L.A. Heberlein, President of Seattle Lab has been in touch with me and reports that the problem has been fixed in v2.6, which should be available in beta form by Friday (10/17). We have not been able to verify this fix, but will do so when it is made available to us, and I would urge any current customers using their product in an Internet-exposed area to consider upgrading to the new version as soon as possible. ----------------------------------------------------------- David LeBlanc | Voice: (770)395-0150 x138 Internet Security Systems, Inc. | Fax: (404)395-1972 41 Perimeter Center East | E-Mail: dleblanc () iss net Suite 660 | www: http://www.iss.net/ Atlanta, GA 30328 |
Current thread:
- `smurf' multi-broadcast icmp attack T. Freak (Oct 12)
- Re: `smurf' multi-broadcast icmp attack Craig A. Huegen (Oct 13)
- Re: `smurf' multi-broadcast icmp attack Ben (Oct 13)
- broadcast ip scanning script hyped (Oct 13)
- Re: `smurf' multi-broadcast icmp attack Therapy? (Oct 16)
- Re: `smurf' multi-broadcast icmp attack Jon Lewis (Oct 16)
- Update - Seattle Lab Slmail v2.5 for NT vulnerable David LeBlanc (Oct 16)
- wwwcount remote exploit Nicolas Dubee (Oct 16)
- Re: wwwcount remote exploit (@ Solaris) Jan Wedekind (Oct 17)
- Security Hole in Explorer 4.0 Aleph One (Oct 17)
- computer immunology VaX#n8 (Oct 17)
- Jabadoo Security Hack Aleph One (Oct 17)
- WinNT syscalls insecurity Solar Designer (Oct 19)
- Re: WinNT syscalls insecurity Roger Espel Llima (Oct 18)
- Run, RunOnce and Uninstall Registry Keys Vulnerability Aleph One (Oct 16)
- <Possible follow-ups>
- Re: `smurf' multi-broadcast icmp attack Brad Powell (Oct 16)