CVE-2006-3215

Clearswift MAILsweeper for SMTP before 4.3.20 and MAILsweeper for Exchange before 4.3.20 allows remote attackers to bypass the "text analysis", possibly bypassing SPAM and other filters, by sending an e-mail specifying a non-existent or unrecognized character set.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:clearswift:mailsweeper_for_exchange:*:*:*:*:*:*:*:*
cpe:2.3:a:clearswift:mailsweeper_for_smtp:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:13

Type Values Removed Values Added
References () http://download.mimesweeper.com/www/TechnicalDocumentation/ReadMe_MSW_4%2C3%2C20.htm - () http://download.mimesweeper.com/www/TechnicalDocumentation/ReadMe_MSW_4%2C3%2C20.htm -
References () http://secunia.com/advisories/20756 - Patch, Vendor Advisory () http://secunia.com/advisories/20756 - Patch, Vendor Advisory
References () http://www.osvdb.org/26737 - () http://www.osvdb.org/26737 -
References () http://www.securityfocus.com/bid/18584 - Patch () http://www.securityfocus.com/bid/18584 - Patch
References () http://www.vupen.com/english/advisories/2006/2473 - () http://www.vupen.com/english/advisories/2006/2473 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27301 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27301 -

07 Nov 2023, 01:58

Type Values Removed Values Added
References
  • {'url': 'http://download.mimesweeper.com/www/TechnicalDocumentation/ReadMe_MSW_4,3,20.htm', 'name': 'http://download.mimesweeper.com/www/TechnicalDocumentation/ReadMe_MSW_4,3,20.htm', 'tags': ['Patch'], 'refsource': 'CONFIRM'}
  • () http://download.mimesweeper.com/www/TechnicalDocumentation/ReadMe_MSW_4%2C3%2C20.htm -

Information

Published : 2006-06-24 01:06

Updated : 2024-11-21 00:13


NVD link : CVE-2006-3215

Mitre link : CVE-2006-3215

CVE.ORG link : CVE-2006-3215


JSON object : View

Products Affected

clearswift

  • mailsweeper_for_exchange
  • mailsweeper_for_smtp