First published: Tue Jun 11 2002(Updated: )
Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header set to 0, which is often ignored by HTTP clients.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro InterScan VirusWall Scan Engine | =3.51 | |
Trend Micro InterScan VirusWall Scan Engine | =3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0440 is considered a medium vulnerability due to its potential for content scanning bypass.
To mitigate CVE-2002-0440, disable the 'Skip scanning if Content-length equals 0' option in Trend Micro InterScan VirusWall.
CVE-2002-0440 affects versions 3.6 and 3.51 of Trend Micro InterScan VirusWall.
CVE-2002-0440 allows attackers to bypass content scanning, potentially exposing users to malicious web content.
A workaround for CVE-2002-0440 is to implement additional security measures, such as a firewall or alternative scanning solutions.