On Mar 16, 2007, at 15:51, David Colliver wrote:
It certainly looks like email addresses. I know that 4000 bytes are
unusual
but this is how a lot of software tends to suffer from exploits like
this,
as 4000 bytes is not regularly tested for.
Its the responsibility of the application to
David Colliver wrote:
Hi Piotr,
I just happened to come across the vulnerability as someone has
reported it on many security websites.
Any links?
BTW: You talked about client components ( SMTP or POP3 ? ), targets
of buffer overflow-attacks usually are servers, otherwise the server was