Hello W. and everyone else...
WNK Is The Bat! subject to the same kind of buffer overflow exploit to which
WNK other email clients are susceptible? (e.g. too long a subject line
WNK etc...)
Well, I don't know how long "too long" is... But I just sent myself a
mail from a command-line mailer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Friday, August 04, 2000, 12:43:54 AM, Gold wrote:
mail from a command-line mailer with a subject 32,748 bytes long, and
TB receives and displays it just fine. Well, pretty much. For some
reason, the string "Length=97" was appended to the end of
Hi W.,
On 03 August 2000 at 10:31:47 GMT -0400 (which was 15:31 where I
live) [EMAIL PROTECTED] wrote and made these points on the subject
of "Buffer overrun vulnerability?":
WNK Hi- I apologize if this question has been raised before, but I
WNK couldn't find mention of it when searching the
3 matches
Mail list logo