[EMAIL PROTECTED] wrote:

Peter J. Holzer wrote:


Otherwise, if it is HTML, filter it through w3m, lynx, or some other
html to text converter.



This is the dangerous part. If there's going to be any way for a malignant HTML email to overflow a buffer, it's here.

Well it's always about moving risk. Yes, compromise of your MTA is probably worse than a compromise of an end-user machine - but you have 10,000 end users and only a few MTAs... Typically an IS group is quicker at patching servers than end users...

Remember the InfoSec saying:"put all your eggs in one basket, AND THEN WATCH THE BASKET".

Jason
_______________________________________________
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users

Reply via email to