On 05 February 2005, 18:08, Alexander S. Kunz wrote:

> But it doesn't disqualify HTML email either just because one or the other
> programmer screwed up and built code vulnerable to attacks. I have trust in
> RITlabs to make their code as best as possible.
~~~

FWIW, I strongly suspect that Microsoft didn't intentionally foist
vulnerable code on its users - and I'm confident that RitLabs won't
either. Notwithstanding that, if you don't support a particular
function, you can't be susceptible to vulnerabilities of that
function.

Now, TB may well have undiscovered vulnerabilities with respect to
off-page images: we don't know. Also, because TB has a fewer users
than the MS MUAs, I suspect that most potential attackers won't
bother. That said, if you never retrieve off-page images, you won't be
vulnerable to attacks they may permit.

-- 
Geoff Lane
Cornwall, UK
--
Using The Bat! v1.62i on Windows XP 5.1 Build 2600 Service Pack 1
Floggings will continue until moral improves!


________________________________________________
Current version is 3.0.1.33 | 'Using TBUDL' information:
http://www.silverstones.com/thebat/TBUDLInfo.html

Reply via email to