On Mon, 2002-02-04 at 02:34, Matt Sergeant wrote:

    Not much of a DoS attack to launch it against your own email server, and
    leave the trace in your own user file ;-)
    
Well, I could get user-level access to your mail server through some
other method, then discover you're running SA, edit
~/.spamassassin/user_prefs, send the compromised account a couple dozen
emails, and clog up your SA server.

    However you can probably execute some sort of perl code in there, which is a
    risk if you're running as root.

Yeah, and that, except it won't be running as root, unless you're
running spamd -u root -x -q, which would just be silly.

C

_______________________________________________
Spamassassin-talk mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/spamassassin-talk

Reply via email to