First published: Tue Dec 31 2002(Updated: )
Trend Micro InterScan VirusWall for Windows NT 3.52 does not record the sender's IP address in the headers for a mail message when it is passed from VirusWall to the MTA, which allows remote attackers to hide the origin of the message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro InterScan VirusWall Scan Engine | =3.52 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1839 has been rated as a low severity vulnerability due to its limited exploitability.
CVE-2002-1839 allows remote attackers to obscure the origin of an email by not recording the sender's IP address in the email headers.
To fix CVE-2002-1839, you should upgrade to a patched version of Trend Micro InterScan VirusWall that addresses this issue.
While CVE-2002-1839 is an older vulnerability, systems still using the affected version may remain at risk if not upgraded.
CVE-2002-1839 specifically affects Trend Micro InterScan VirusWall for Windows NT version 3.52.