Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header set to 0, which is often ignored by HTTP clients.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/lists/bugtraq/2002/Mar/0162.html - | |
References | () http://www.inside-security.de/vwall_cl0.html - | |
References | () http://www.iss.net/security_center/static/8425.php - | |
References | () http://www.securityfocus.com/bid/4265 - Patch, Vendor Advisory |
Information
Published : 2002-07-26 04:00
Updated : 2024-11-20 23:39
NVD link : CVE-2002-0440
Mitre link : CVE-2002-0440
CVE.ORG link : CVE-2002-0440
JSON object : View
Products Affected
trend_micro
- interscan_viruswall
CWE