• Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings
InterScan VirusWall 3.52 build 1462 allows remote attackers to bypass virus protection via e-mail messages with headers that violate RFC specifications by having (or missing) space characters in unexpected places (aka "space gap"), such as (1) Content-Type :", (2) "Content-Transfer-Encoding :", (3) no space before a boundary declaration, or (4) "boundary= ", which is processed by Outlook Express.
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
Date Entry Created
20020625 Disclaimer: The entry creation date may reflect when the CVE-ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Phase (Legacy)
Modified (20071101)
Votes (Legacy)
ACCEPT(1) Baker
MODIFY(1) Frech
NOOP(6) Armstrong, Christey, Cole, Cox, Foat, Wall
Comments (Legacy)
 Christey> BID:5259
   According to Axel Pettinger, Solaris 3.7 build 1070
   is affected by the "boundary space (trailing)" and "Boundary
   Space (prefix)" problems, but not the content-type or transfer
   encoding issues.  That version clearly has some overlap with
   this issue, but since a different build and version number are
   affected, perhaps a separate candidate needs to be created.
   More information on that issue is at:
 Frech> XF:interscan-viruswall-protection-bypass(9464)

Proposed (Legacy)
This is an entry on the CVE list, which standardizes names for security problems.