| Summary | SMTP content filter engines, including (1) GFI MailSecurity for Exchange/SMTP before 7.2, (2) InterScan VirusWall before 3.52 build 1494, (3) the default configuration of MIMEDefang before 2.21, and possibly other products, do not detect fragmented emails as defined in RFC2046 ("Message Fragmentation and Reassembly") and supported in such products as Outlook Express, which allows remote attackers to bypass content filtering, including virus checking, via fragmented emails of the message/partial content type. |
|---|---|
| Publication Date | Sept. 24, 2002, 1 p.m. |
| Registration Date | Jan. 29, 2021, 6:04 p.m. |
| Last Update | Oct. 18, 2016, 11:23 a.m. |
| CVSS2.0 : HIGH | |
| Score | 7.5 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | はい |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:gfi:mailsecurity:7.2:*:exchange_smtp:*:*:*:*:* | |||||
| cpe:2.3:a:network_associates:webshield_smtp:4.0.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:network_associates:webshield_smtp:4.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:network_associates:webshield_smtp:4.5.44:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:network_associates:webshield_smtp:4.5.74.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:roaring_penguin:canit:1.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:roaring_penguin:mimedefang:2.14:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:roaring_penguin:mimedefang:2.20:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:trend_micro:interscan_viruswall:3.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:trend_micro:interscan_viruswall:3.51:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:trend_micro:interscan_viruswall:3.52:*:*:*:*:*:*:* | |||||