Rit Research Labs 'The Bat!' 1.x - Missing Linefeeds Denial of Service

Author: 3APA3A
type: dos
platform: windows
port: 
date_added: 2001-04-18  
date_updated: 2012-08-27  
verified: 1  
codes: CVE-2001-0675;OSVDB-1797  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 20783.txt  
source: https://www.securityfocus.com/bid/2636/info

"The Bat!" is an MUA for Windows by Rit Research Labs.

"The Bat!" is vulnerable to a remote denial of service attack. Email messages in which carriage return (CR) characters are not followed by a linefeed (LF) can cause "The Bat!" to incorrectly interpret the message's structure. This can lead "The Bat!" to read text in the message body as a response from the POP3 server. The current (corrupt) message will not be deleted from the server, and the mail download process will stop.

As a result, the user will remain unable to receive new email messages from the affected POP3 account.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20783.zip