[EMAIL PROTECTED] wrote:
Peter J. Holzer wrote:Well it's always about moving risk. Yes, compromise of your MTA is probably worse than a compromise of an end-user machine - but you have 10,000 end users and only a few MTAs... Typically an IS group is quicker at patching servers than end users...
Otherwise, if it is HTML, filter it through w3m, lynx, or some other
html to text converter.
This is the dangerous part. If there's going to be any way for a malignant HTML email to overflow a buffer, it's here.
Remember the InfoSec saying:"put all your eggs in one basket, AND THEN WATCH THE BASKET".
Jason _______________________________________________ http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
