Alright - now harm done though

It also came with some security issues for IMP (webmail). Should they matter?
Otherwise the systems seem extremely safe - The conclussion is that the no serious holes found and the majority of hackers would look for something else.
I have taken the HTML viever for IMP 3.2.2 and used to fix this.
The remote server is running IMP version 3.0, 3.1, 3.2, or 3.2.1. These
versions are vulnerable to several cross-scripting attacks whereby an
attacker can cause a victim to unknowingly run arbitrary Javascript code
simply by reading an HTML message from the attacker.
Announcements of the vulnerabilities can be found at:
-
http://marc.theaimsgroup.com/?l=imp&m=105940167329471&w=2-
http://marc.theaimsgroup.com/?l=imp&m=105981180431599&w=2-
http://marc.theaimsgroup.com/?l=imp&m=105990362513789&w=2Note: Nessus has determined the vulnerability exists on the target
simply by looking at the version number of IMP installed there. If the
installation has already been patched, consider this a false positive.
Solution: Apply patches found in the announcements to
imp/lib/MIME/Viewer/html.php.
Risk factor : Serious
Nessus ID : 11815