Bugtraq mailing list archives
Re: Long attachment filename exploits: a procmail filter
From: jhardin () WOLFENET COM (John D. Hardin)
Date: Wed, 29 Jul 1998 20:42:46 -0700
On Wed, 29 Jul 1998, Brett Glass wrote:
Finally, there are other possible exploits, like a very long content type, that might also lead to buffer oveflows in mail clients. These should be checked too.
Okay, very long Content-Type headers are now sanitized as well. Grab the latest from http://www.wolfenet.com/~jhardin/html-trap.procmail and take a look. -- John Hardin KA7OHZ jhardin () wolfenet com pgpk -a finger://gonzo.wolfenet.com/jhardin PGP key ID: 0x41EA94F5 PGP key fingerprint: A3 0C 5B C2 EF 0D 2C E5 E9 BF C8 33 A7 A9 CE 76 ----------------------------------------------------------------------- Your mouse has moved. Windows NT must be restarted for the change to take effect. Reboot now? [ OK ] ----------------------------------------------------------------------- 88 days until Daylight Savings Time ends
Current thread:
- Re: Long attachment filename exploits: a procmail filter Brett Glass (Jul 29)
- Re: Long attachment filename exploits: a procmail filter John D. Hardin (Jul 29)
- Re: Long attachment filename exploits: a procmail filter John D. Hardin (Jul 29)