First published: Fri Sep 24 2004(Updated: )
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may be interpreted differently by mail clients.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Paul L Daniels Ripmime | =1.2.0 | |
F-secure Internet Gatekeeper | =6.32 | |
F-secure Internet Gatekeeper | =6.3 | |
Paul L Daniels Ripmime | =1.2.2 | |
Paul L Daniels Ripmime | =1.3.2.2 | |
Clearswift MAILsweeper | =4.3.7 | |
Paul L Daniels Ripmime | =1.2.3 | |
Paul L Daniels Ripmime | =1.2.6 | |
Paul L Daniels Ripmime | =1.3.2.3 | |
Clearswift MAILsweeper | =4.3.15 | |
F-secure Internet Gatekeeper | =6.4 | |
Paul L Daniels Ripmime | =1.2.5 | |
Clearswift MAILsweeper | =4.3.11 | |
Paul L Daniels Ripmime | =1.3.2.0 | |
Clearswift MAILsweeper | =4.3.13 | |
Paul L Daniels Ripmime | =1.2.1 | |
F-secure Internet Gatekeeper | =6.31 | |
Paul L Daniels Ripmime | =1.2.4 | |
Clearswift MAILsweeper | =4.3.14 | |
Paul L Daniels Ripmime | =1.2.7 | |
Clearswift MAILsweeper | =4.3.8 | |
Clearswift MAILsweeper | =4.3.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.