Home | Blog | Software | Reviews and Features | Forum | Help | Donate | About us

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • October 22, 2016, 10:23:30 PM
  • Proudly celebrating 10 years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Author Topic: The Bat! Buffer Overflow Vulnerability (fixed in latest version)  (Read 2246 times)


  • Developer
  • Joined in 2005
  • ***
  • Posts: 1,120
    • View Profile
    • Donate to Member
The Bat! Buffer Overflow Vulnerability (fixed in latest version)
« on: February 26, 2006, 03:56:57 AM »
Just wanted to note this:


Nemesis Security Audit Group has discovered a vulnerability in The Bat!, which potentially can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error within the parsing of the email subject header. This can be exploited to cause a unicode stack-based buffer overflow via a specially-crafted email message with an overly long subject.

The vulnerability has been confirmed in version 3.60.07. Other versions may also be affected.

Update to version 3.71.03.