Re: [SM-USERS] Spam Sent from WebMail

2007-10-10 Thread Nick Bright
Tomas Kuliavas wrote: Installed Plugins 1. delete_move_next 2. squirrelspell 3. newmail 4. mpppolicygroup 5. quota_usage Available Plugins: 6. translate 7. compatibility 8. spamcop 9. sent_subfolders

Re: [SM-USERS] Spam Sent From WebMail

2007-10-09 Thread Nick Bright
Paul Lesniewski wrote: On 10/9/07, Nick Bright <[EMAIL PROTECTED]> wrote: Paul Lesniewski wrote: On 10/9/07, Ken A <[EMAIL PROTECTED]> wrote: Nick Bright wrote: Ken A wrote: Nick Bright wrote: Per some suggestions in the thread I was able to determine that they are not using

Re: [SM-USERS] Spam Sent From WebMail

2007-10-09 Thread Nick Bright
d users' password was compromised, but is there any way to mitigate this type of thing? I would appreciate any feedback regarding this topic and methods of mitigating damage done by compromised accounts. I will also answer any questions that may help develop a method of mitigation. - Nick Bright

Re: [SM-USERS] Spam Sent from WebMail

2007-10-09 Thread Nick Bright
Ken A wrote: Nick Bright wrote: Tomas Kuliavas wrote: Have you tried to protect your webmail traffic? Signed SSL certificate costs less than 20 USD. I'd expect they support SSL on their end, this probably wouldn't make any difference. The difference is that fewer passwords could

Re: [SM-USERS] Spam Sent from WebMail

2007-10-09 Thread Nick Bright
Paul Lesniewski wrote: On 10/9/07, Tomas Kuliavas <[EMAIL PROTECTED]> wrote: CentOS 4.5 w/ squirrelmail-1.4.8-4.0.1.el4.centos. Plugins are: CVE-2006-6142, CVE-2007-1262, CVE-2007-2589. Please note that html filtering functions must be patched to 1.4.10+ level. Having only 1.4.9a patches is not

Re: [SM-USERS] Spam Sent From WebMail

2007-10-09 Thread Nick Bright
Paul Lesniewski wrote: On 10/9/07, Ken A <[EMAIL PROTECTED]> wrote: Nick Bright wrote: Ken A wrote: Nick Bright wrote: Per some suggestions in the thread I was able to determine that they are not using "mailto.php", but rather compose.php: /var/log/httpd/access_log:196.1

Re: [SM-USERS] Spam Sent from WebMail

2007-10-09 Thread Nick Bright
ser, from what I can tell. They are using a valid username and password apparently culled from an infected PC somewhere. Have you tried to protect your webmail traffic? Signed SSL certificate costs less than 20 USD. I'd expect they support SSL on their end, this probably wouldn't

Re: [SM-USERS] Spam Sent From WebMail

2007-10-09 Thread Nick Bright
Ken A wrote: Nick Bright wrote: Ken A wrote: Nick Bright wrote: Per some suggestions in the thread I was able to determine that they are not using "mailto.php", but rather compose.php: /var/log/httpd/access_log:196.1.179.183 - - [07/Oct/2007:21:54:10 -0500] "GET /webmail/

Re: [SM-USERS] Spam Sent From WebMail

2007-10-09 Thread Nick Bright
Ken A wrote: Nick Bright wrote: Per some suggestions in the thread I was able to determine that they are not using "mailto.php", but rather compose.php: /var/log/httpd/access_log:196.1.179.183 - - [07/Oct/2007:21:54:10 -0500] "GET /webmail/src/compose.php?mail_sent=yes HTTP

Re: [SM-USERS] Spam Sent From WebMail

2007-10-09 Thread Nick Bright
like this is a bug or a security vulnerability in SM since a valid users' password was compromised, but is there any way to mitigate this type of thing? I would appreciate any feedback regarding this topic and methods of mitigating damage done by compromised accounts. I will also answer an