Hi W.,

On 03 August 2000 at 10:31:47 GMT -0400 (which was 15:31 where I
live) [EMAIL PROTECTED] wrote and made these points on the subject
of "Buffer overrun vulnerability?":

WNK> Hi-  I  apologize  if this question has been raised before, but I
WNK> couldn't find mention of it when searching the list archives...

WNK> Is The Bat! subject to the same kind of buffer overflow exploit
WNK> to which other email clients are susceptible? (e.g. too long a
WNK> subject line etc...)

I  don't  believe  it  is  at  all.  IMHO  being written in Delphi - a
language  which  uses  dynamic  strings  as  part  of  the fundamental
linguistic  basis  and  not fixed sized buffers like C and C++ - would
take it completely away from that kind of issue anyway.

Anyone else got any other views on this?

-- 
Cheers,
.\\arck

Marck D. Pearlstone, Consultant Software Engineer
Moderator TBUDL / TBBETA
www: http://www.silverstones.com
PGP key: <mailto:[EMAIL PROTECTED]?Body=GET%20MARCKKEY>
*-----------------------------------------------
| Using The Bat! 1.46 Beta/2 S/N 14F4B4B2
| under Windows 98 4.10 Build 1998  
*-----------------------------------------------

-- 
--------------------------------------------------------------
View the TBUDL archive at http://tbudl.thebat.dutaint.com
To send a message to the list moderation team double click here:
   <mailto:[EMAIL PROTECTED]>
To Unsubscribe from TBUDL, double click here and send the message:
   <mailto:[EMAIL PROTECTED]>
--------------------------------------------------------------

You are subscribed as : archive@jab.org


Reply via email to