This calls for a patch to resend to stop messages with overly long MIME
headers from being relayed. Does anyone know how long is "overly long"?
> The U.S. Department of Energy
> Computer Incident Advisory Capability
> ___ __ __ _ ___
> / | /_\ /
> \___ __|__ / \ \___
> ADVISORY BULLETIN
> Mime Name Vulnerability in Outlook and Messenger
>July 27, 1998 20:00 GMT Number I-077
>PROBLEM: A buffer overflow vulnerability has been identified in
> Microsoft Outlook, Outlook Express, and Netscape Messenger
> (Mail) that allows an e-mail or news message to contain
> malicious code in a mime header. That code is executed when the
> header is read by the e-mail/news reader. All of these
> e-mail/news readers are widely distributed with popular
> packages such as Internet Explorer, Windows 98, Windows 97,
> Office 97, and Netscape Communicator.
>PLATFORM: Any platform that runs the vulnerable e-mail/news readers:
> Windows 95, Windows 98, Windows NT, Macintosh and Solaris.
>DAMAGE: If exploited, this vulnerability allows a remote user to run
> arbitrary code on a users machine with the user's privileges.
> The remotely executed code could do anything from sending
> thousands of e-mails in the user's name to formatting the hard
>SOLUTION: Apply patches from Microsoft and Netscape.
>VULNERABILITY Risk is high. While we have not yet heard of anyone exploiting
>ASSESSMENT: this vulnerability for malicious purposes, the ease with which
> it can be exploited, the wide distribution of vulnerable
> readers, and the potential for damage makes it a very serious