Hi W.,
On 03 August 2000 at 10:31:47 GMT -0400 (which was 15:31 where I
live) [EMAIL PROTECTED] wrote and made these points on the subject
of "Buffer overrun vulnerability?":
WNK> Hi- I apologize if this question has been raised before, but I
WNK> couldn't find mention of it when searching the list archives...
WNK> Is The Bat! subject to the same kind of buffer overflow exploit
WNK> to which other email clients are susceptible? (e.g. too long a
WNK> subject line etc...)
I don't believe it is at all. IMHO being written in Delphi - a
language which uses dynamic strings as part of the fundamental
linguistic basis and not fixed sized buffers like C and C++ - would
take it completely away from that kind of issue anyway.
Anyone else got any other views on this?
--
Cheers,
.\\arck
Marck D. Pearlstone, Consultant Software Engineer
Moderator TBUDL / TBBETA
www: http://www.silverstones.com
PGP key: <mailto:[EMAIL PROTECTED]?Body=GET%20MARCKKEY>
*-----------------------------------------------
| Using The Bat! 1.46 Beta/2 S/N 14F4B4B2
| under Windows 98 4.10 Build 1998
*-----------------------------------------------
--
--------------------------------------------------------------
View the TBUDL archive at http://tbudl.thebat.dutaint.com
To send a message to the list moderation team double click here:
<mailto:[EMAIL PROTECTED]>
To Unsubscribe from TBUDL, double click here and send the message:
<mailto:[EMAIL PROTECTED]>
--------------------------------------------------------------
You are subscribed as : archive@jab.org