On 05 February 2005, 18:08, Alexander S. Kunz wrote: > But it doesn't disqualify HTML email either just because one or the other > programmer screwed up and built code vulnerable to attacks. I have trust in > RITlabs to make their code as best as possible. ~~~
FWIW, I strongly suspect that Microsoft didn't intentionally foist vulnerable code on its users - and I'm confident that RitLabs won't either. Notwithstanding that, if you don't support a particular function, you can't be susceptible to vulnerabilities of that function. Now, TB may well have undiscovered vulnerabilities with respect to off-page images: we don't know. Also, because TB has a fewer users than the MS MUAs, I suspect that most potential attackers won't bother. That said, if you never retrieve off-page images, you won't be vulnerable to attacks they may permit. -- Geoff Lane Cornwall, UK -- Using The Bat! v1.62i on Windows XP 5.1 Build 2600 Service Pack 1 Floggings will continue until moral improves! ________________________________________________ Current version is 3.0.1.33 | 'Using TBUDL' information: http://www.silverstones.com/thebat/TBUDLInfo.html

