First published: Tue Dec 31 2002(Updated: )
InterScan VirusWall 3.6 for Linux and 3.52 for Windows allows remote attackers to bypass virus protection and possibly execute arbitrary code via HTTP 1.1 chunked transfer encoding.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro InterScan VirusWall Scan Engine | =3.52 | |
Trend Micro InterScan VirusWall Scan Engine | =3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-2394 is considered a critical vulnerability due to its potential to allow remote attackers to bypass virus protection.
To fix CVE-2002-2394, it is recommended to upgrade to the latest version of Trend Micro InterScan VirusWall that addresses this vulnerability.
CVE-2002-2394 affects Trend Micro InterScan VirusWall versions 3.6 for Linux and 3.52 for Windows.
Yes, CVE-2002-2394 may allow remote attackers to execute arbitrary code due to the vulnerability in the chunked transfer encoding.
CVE-2002-2394 affects different operating systems, specifically Linux and Windows versions of Trend Micro InterScan VirusWall.