CVE-2002-0440

Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header set to 0, which is often ignored by HTTP clients.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trend_micro:interscan_viruswall:3.6:*:*:*:*:*:*:*
cpe:2.3:a:trend_micro:interscan_viruswall:3.51:*:*:*:*:*:*:*

History

20 Nov 2024, 23:39

Type Values Removed Values Added
References () http://seclists.org/lists/bugtraq/2002/Mar/0162.html - () http://seclists.org/lists/bugtraq/2002/Mar/0162.html -
References () http://www.inside-security.de/vwall_cl0.html - () http://www.inside-security.de/vwall_cl0.html -
References () http://www.iss.net/security_center/static/8425.php - () http://www.iss.net/security_center/static/8425.php -
References () http://www.securityfocus.com/bid/4265 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/4265 - Patch, Vendor Advisory

Information

Published : 2002-07-26 04:00

Updated : 2024-11-20 23:39


NVD link : CVE-2002-0440

Mitre link : CVE-2002-0440

CVE.ORG link : CVE-2002-0440


JSON object : View

Products Affected

trend_micro

  • interscan_viruswall