The Bat! is not affected by the TNEF Vulnerability
The Bat! is not affected by the TNEF Decoding Remote Code Execution Vulnerability, discovered by John Heasman and Marc Litchfield of NGS Software.
Outlook and the Microsoft Exchange Client sometimes use a special method to package information for sending messages across the Internet. This method is technically referred to as Transport Neutral Encapsulation Format (TNEF). A TNEF-encoded message contains a plain text version of the message, and a binary attachment that "packages" various other parts of the original message. In most cases, the binary attachment will be named Winmail.dat
The Bat! does not support TNEF format and is not affected by this vulnerability.
This vulnerability presents itself when the applications decode a message containing a specially crafted TNEF MIME attachment. Successful exploitation may result in arbitrary code execution facilitating a remote compromise.
You can read more about this vulnerability here: http://securityresponse.symantec.com/avcenter/security/Content/16197.html
Outlook and the Microsoft Exchange Client sometimes use a special method to package information for sending messages across the Internet. This method is technically referred to as Transport Neutral Encapsulation Format (TNEF). A TNEF-encoded message contains a plain text version of the message, and a binary attachment that "packages" various other parts of the original message. In most cases, the binary attachment will be named Winmail.dat
The Bat! does not support TNEF format and is not affected by this vulnerability.
This vulnerability presents itself when the applications decode a message containing a specially crafted TNEF MIME attachment. Successful exploitation may result in arbitrary code execution facilitating a remote compromise.
You can read more about this vulnerability here: http://securityresponse.symantec.com/avcenter/security/Content/16197.html