February 5, 2001
The exploit enables monitoring the forwarded path of an e-mail message and written comments attached.
"In a business negotiation conducted via email, one side can learn inside information from the other side as the proposal is discussed through the recipient company's internal email system," the advisory notes.
It's also a handy way for spammers to harvest thousands of fresh, live addresses.
© 2001 Thomas C Greene, The Register