SMTP content filter engines, including (1) GFI MailSecurity for Exchange/SMTP before 7.2, (2) InterScan VirusWall before 3.52 build 1494, (3) the default configuration of MIMEDefang before 2.21, and possibly other products, do not detect fragmented emails as defined in RFC2046 ("Message Fragmentation and Reassembly") and supported in such products as Outlook Express, which allows remote attackers to bypass content filtering, including virus checking, via fragmented emails of the message/partial content type.
Max CVSS
7.5
EPSS Score
1.12%
Published
2002-09-24
Updated
2016-10-18
NAI WebShield SMTP 4.5 and possibly 4.5 MR1a does not filter improperly MIME encoded email attachments, which could allow remote attackers to bypass filtering and possibly execute arbitrary code in email clients that process the invalid attachments.
Max CVSS
7.5
EPSS Score
0.98%
Published
2001-12-31
Updated
2011-03-08
McAfee WebShield SMTP 4.5 allows remote attackers to bypass email content filtering rules by including Extended ASCII characters in name of the attachment.
Max CVSS
7.5
EPSS Score
0.34%
Published
2001-01-09
Updated
2008-09-05
McAfee WebShield SMTP 4.5 allows remote attackers to cause a denial of service via a malformed recipient field.
Max CVSS
5.0
EPSS Score
0.75%
Published
2001-01-09
Updated
2008-09-05
WebShield SMTP 4.5 allows remote attackers to cause a denial of service by sending e-mail with a From: address that has a . (period) at the end, which causes WebShield to continuously send itself copies of the e-mail.
Max CVSS
5.0
EPSS Score
0.52%
Published
2000-10-20
Updated
2017-10-10
5 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!