Please see bug 6155 comment 128.
https://issues.apache.org/SpamAssassin/show_bug.cgi?id=6155#c128
The issue persists, and being an onet.pl customer using The Bat! MUA is
kind of a deadly combination. Those are being shot single-handedly.
score KB_DATE_CONTAINS_TAB 3.800 3.799 3.799 2.751
score KB_FAKED_THE_BAT 2.432 3.441 2.008 2.694
Comments? Is this something we need to worry about? I do, rather scary
to me. :/
--
char *t="\10pse\0r\0dtu...@ghno\x4e\xc8\x79\xf4\xab\x51\x8a\x10\xf4\xf4\xc4";
main(){ char h,m=h=*t++,*x=t+2*h,c,i,l=*x,s=0; for (i=0;i<l;i++){ i%8? c<<=1:
(c=*++x); c&128 && (s+=h); if (!(h>>=1)||!t[s+h]){ putchar(t[s]);h=m;s=0; }}}