Re: Buffer overrun vulnerability?

2000-08-04 Thread Steve Lamb
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Friday, August 04, 2000, 12:43:54 AM, Gold wrote: > mail from a command-line mailer with a subject 32,748 bytes long, and > TB receives and displays it just fine. Well, pretty much. For some > reason, the string "Length=97" was appended to the end of

Re: Buffer overrun vulnerability?

2000-08-04 Thread Gold Gaurami
Hello W. and everyone else... WNK> Is The Bat! subject to the same kind of buffer overflow exploit to which WNK> other email clients are susceptible? (e.g. too long a subject line WNK> etc...) Well, I don't know how long "too long" is... But I just sent myself a mail from a command-line mailer

Re: Buffer overrun vulnerability?

2000-08-03 Thread Marck D. Pearlstone
Hi W., On 03 August 2000 at 10:31:47 GMT -0400 (which was 15:31 where I live) [EMAIL PROTECTED] wrote and made these points on the subject of "Buffer overrun vulnerability?": WNK> Hi- I apologize if this question has been raised before, but I WNK> couldn't find mention

Buffer overrun vulnerability?

2000-08-03 Thread W. Nicholas Knisely
8/3/2000 at 10:28 AM Hi- I apologize if this question has been raised before, but I couldn't find mention of it when searching the list archives... Is The Bat! subject to the same kind of buffer overflow exploit to which other email clients are susceptible? (e.g. too long a subject line etc...)