InterScan VirusWall 3.52 build 1462 allows remote attackers to bypass virus protection via e-mail messages with headers that violate RFC specifications by having (or missing) space characters in unexpected places (aka "space gap"), such as (1) Content-Type :", (2) "Content-Transfer-Encoding :", (3) no space before a boundary declaration, or (4) "boundary= ", which is processed by Outlook Express.
References
Link | Resource |
---|---|
http://www.iss.net/security_center/static/9464.php | |
http://www.securiteam.com/securitynews/5KP000A7QE.html | Patch Vendor Advisory |
http://www.iss.net/security_center/static/9464.php | |
http://www.securiteam.com/securitynews/5KP000A7QE.html | Patch Vendor Advisory |
Configurations
History
20 Nov 2024, 23:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.iss.net/security_center/static/9464.php - | |
References | () http://www.securiteam.com/securitynews/5KP000A7QE.html - Patch, Vendor Advisory |
Information
Published : 2002-07-11 04:00
Updated : 2024-11-20 23:39
NVD link : CVE-2002-0637
Mitre link : CVE-2002-0637
CVE.ORG link : CVE-2002-0637
JSON object : View
Products Affected
trend_micro
- interscan_viruswall
CWE