> > Do you know how can I test if a MUI app is vulnerable?
>
> I'm sorry, I don't know. It was something to do with sending control characters via internet. YAM, Voyager, SimpleMail, FreeCiv, IBrowse and AmIRC at least were made immune to this exploit.
You should be a bit more precise. It is not a MUI problem per se. It is, a very dangerous file handler is installed by default on OS3.5/3.9 systems, namely the AWNPIPE:. This "thing" allows to *execute programs* using a *filepath*.
The "vulnerability" of MUI is, that it allows to load images through text strings. Now if you would try to display a text through MUI that contained a AWNPIPE: filepath with some nasty command, it would be executed without user control.
BUT the problem is not MUI. It is AWNPIPE! Because it is broken by design. It is the security hole! Any program that would use filenames from an external source (e.g. internet) then is a potential key to your machine. Let it be a browser (e.g. an image). Let it be an E-Mail. DCC request, Sound requests, etc. But also, let it just be some *configuration file* with external paths. The possibilities are endless, and no one application programmer has to take care of such a mess in a system.
Just take care that you don't use (mount) the AWNPIPE and you're safe.