Recently there have been numerous reports about a new vulnerability in Microsoft email products, which is caused by erroneous processing of POP3 server responses. This vulnerability allows the executing of unauthenticated remote code on the target system. Details – http://seclists.org/bugtraq/2010/May/65
All of us at RITLabs would like to reiterate that our email clients The Bat! benefits from our propriatary software architecture. The Bat! link processing algorithm functions differently from the one used by Microsoft products. Therefore, The Bat! users can rest assured, that these Microsoft vulnerabilities will not affect them.