Description
The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT! to misrepresent the attachment's type with a different icon.
CVSS Metrics
- Vector
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- Access Vector
- network
- Access Cmplx
- low
- Auth
- none
- Confidentiality
- partial
- Integrity
- partial
- Availability
- partial
- Weaknesses
- NVD-CWE-Other
Metadata
- Primary Vendor
- RITLABS
- Published
- 6/18/2001
- Last Modified
- 4/3/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
ritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_batritlabs : the_bat
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.