First published: Thu Jul 04 2002(Updated: )
InterScan VirusWall 3.52 build 1462 allows remote attackers to bypass virus protection via e-mail messages with headers that violate RFC specifications by having (or missing) space characters in unexpected places (aka "space gap"), such as (1) Content-Type :", (2) "Content-Transfer-Encoding :", (3) no space before a boundary declaration, or (4) "boundary= ", which is processed by Outlook Express.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro InterScan VirusWall Scan Engine | =3.52 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0637 is classified as a medium severity vulnerability, allowing remote attackers to bypass virus protection.
To fix CVE-2002-0637, upgrade to a newer version of Trend Micro InterScan VirusWall that addresses this vulnerability.
CVE-2002-0637 affects email headers including Content-Type and Content-Transfer-Encoding, where space characters can be improperly placed.
Yes, CVE-2002-0637 can be exploited remotely, allowing attackers to send malicious emails that bypass virus scanning.
CVE-2002-0637 specifically impacts InterScan VirusWall version 3.52.