First published: Wed Dec 31 2003(Updated: )
MAILsweeper for SMTP 4.3 allows remote attackers to bypass virus protection via a mail message with a malformed zip attachment, as exploited by certain MIMAIL virus variants.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Clearswift MAILsweeper | =4.3 | |
Clearswift MAILsweeper | =4.3.6 | |
Clearswift MAILsweeper | =4.0 | |
Clearswift MAILsweeper | =4.3.4 | |
Clearswift MAILsweeper | =4.2 | |
Clearswift MAILsweeper | =4.3.7 | |
Clearswift MAILsweeper | =4.3.3 | |
Clearswift MAILsweeper | =4.3.5 | |
Clearswift MAILsweeper | =4.1 | |
Clearswift MAILsweeper | =4.3.10 | |
Clearswift MAILsweeper | =4.3.8 | |
Clearswift MAILsweeper | =4.3.6_sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-1154 is considered to be of medium severity due to its potential for virus bypassing security measures.
To fix CVE-2003-1154, it's recommended to upgrade to the latest version of MAILsweeper that addresses this vulnerability.
CVE-2003-1154 affects multiple versions of MAILsweeper including 4.0, 4.1, 4.2, 4.3.3 through 4.3.10.
By exploiting CVE-2003-1154, attackers can bypass virus protection mechanisms when using malformed zip attachments.
Yes, a patch or updated version is available from Clearswift to mitigate the risks associated with CVE-2003-1154.