First published: Sat Sep 14 2002(Updated: )
SMTP content filter engines, including (1) GFI MailSecurity for Exchange/SMTP before 7.2, (2) InterScan VirusWall before 3.52 build 1494, (3) the default configuration of MIMEDefang before 2.21, and possibly other products, do not detect fragmented emails as defined in RFC2046 ("Message Fragmentation and Reassembly") and supported in such products as Outlook Express, which allows remote attackers to bypass content filtering, including virus checking, via fragmented emails of the message/partial content type.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GFI MailSecurity | =7.2 | |
Trend Micro InterScan VirusWall Scan Engine | =3.51 | |
MIMEDefang | =2.14 | |
WebShield | =4.0.5 | |
Trend Micro InterScan VirusWall Scan Engine | =3.5 | |
Roaring Penguin CanIT | =1.2 | |
WebShield | =4.5.44 | |
MIMEDefang | =2.20 | |
WebShield | =4.5.74.0 | |
Trend Micro InterScan VirusWall Scan Engine | =3.52 | |
WebShield | =4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1121 is considered a Medium severity vulnerability due to its potential exploitation in SMTP content filter engines.
To fix CVE-2002-1121, update your SMTP content filtering software to the latest version that addresses this vulnerability.
CVE-2002-1121 affects GFI MailSecurity, Trend Micro InterScan VirusWall, and Roaring Penguin MIMEDefang, among others.
The impact of CVE-2002-1121 includes the inability to detect fragmented emails, which can lead to undetected malicious content.
CVE-2002-1121 specifically affects certain versions of the identified software, so users must verify their specific versions for vulnerability.