https://issues.apache.org/bugzilla/show_bug.cgi?id=51873

--- Comment #2 from Jeremy <[email protected]> 2011-09-22 18:39:19 UTC ---
Can you please supply the format to use to run the POIFSLister?  I found it
mentioned on the website but no specification about how to fire it off from the
commandline.

I'm also going to try some hacks to the current build to see if I can get a
work-around that can be supplied as a patch.  This issue seems to be specific
to the version and method of Outlook used to generate these files.  Any
modification and re-saving of them fixes the issue.  I'm not sure how the hex
editor may work as a good percentage of these files also have image attachments
that also contain sensitive information.  Unless you have any tips for using
the editor to also yank out binary attachements without corrupting the original
msg?

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to