CVE-2002-0637

InterScan VirusWall 3.52 build 1462 allows remote attackers to bypass virus protection via e-mail messages with headers that violate RFC specifications by having (or missing) space characters in unexpected places (aka "space gap"), such as (1) Content-Type :", (2) "Content-Transfer-Encoding :", (3) no space before a boundary declaration, or (4) "boundary= ", which is processed by Outlook Express.
Configurations

Configuration 1 (hide)

cpe:2.3:a:trend_micro:interscan_viruswall:3.52:*:*:*:*:*:*:*

History

20 Nov 2024, 23:39

Type Values Removed Values Added
References () http://www.iss.net/security_center/static/9464.php - () http://www.iss.net/security_center/static/9464.php -
References () http://www.securiteam.com/securitynews/5KP000A7QE.html - Patch, Vendor Advisory () http://www.securiteam.com/securitynews/5KP000A7QE.html - Patch, Vendor Advisory

Information

Published : 2002-07-11 04:00

Updated : 2024-11-20 23:39


NVD link : CVE-2002-0637

Mitre link : CVE-2002-0637

CVE.ORG link : CVE-2002-0637


JSON object : View

Products Affected

trend_micro

  • interscan_viruswall