First published: Wed Dec 31 2003(Updated: )
Clearswift MAILsweeper 4.0 through 4.3.7 allows remote attackers to bypass filtering via a file attachment that contains "multiple extensions combined with large blocks of white space."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Clearswift MAILsweeper Business Suite | =4.3 | |
Clearswift MAILsweeper Business Suite | =4.3.6 | |
Clearswift MAILsweeper Business Suite | =4.0 | |
Clearswift MAILsweeper Business Suite | =4.3.4 | |
Clearswift MAILsweeper Business Suite | =4.2 | |
Clearswift MAILsweeper Business Suite | =4.3.7 | |
Clearswift MAILsweeper Business Suite | =4.3.3 | |
Clearswift MAILsweeper Business Suite | =4.3.5 | |
Clearswift MAILsweeper Business Suite | =4.1 | |
Clearswift MAILsweeper Business Suite | =4.3.6_sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-1485 is considered a medium-risk vulnerability due to its potential to bypass email filtering.
To fix CVE-2003-1485, it is recommended to upgrade to the latest version of Clearswift MAILsweeper available at the time.
CVE-2003-1485 affects Clearswift MAILsweeper versions from 4.0 to 4.3.7.
CVE-2003-1485 allows remote attackers to circumvent file attachment filtering by manipulating file names through whitespace.
If upgrading is not feasible, administrators should review email filtering configurations and monitor attachments closely for suspicious filenames.