René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

87 lines
2.8 KiB
JSON

{
"id": "CVE-2002-0637",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-07-11T04:00:00.000",
"lastModified": "2008-09-05T20:28:32.537",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "InterScan VirusWall 3.52 build 1462 allows remote attackers to bypass virus protection via e-mail messages with headers that violate RFC specifications by having (or missing) space characters in unexpected places (aka \"space gap\"), such as (1) Content-Type :\", (2) \"Content-Transfer-Encoding :\", (3) no space before a boundary declaration, or (4) \"boundary= \", which is processed by Outlook Express."
},
{
"lang": "es",
"value": "Interscan VirusWall build 1462 permite a atacantes remotos evadir la protecci\u00f3n mediante mensajes de correo con cabeceras que no cumplen la especificaci\u00f3nes RFC por tener (o faltarle) caract\u00e9res de espacio en lugares inesperados (tambi\u00e9n conocido como \"space gap\"); como en:\r\n\r\n\"Content-Type :\"\r\n\"Content-Transfer-Encoding :\"\r\nSin espacio antes de una declaraci\u00f3n de l\u00edmites, o\r\n \"boundary= \", que es procesado por Outlook Express."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": true,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trend_micro:interscan_viruswall:3.52:*:*:*:*:*:*:*",
"matchCriteriaId": "C7A7881A-BC30-471E-8D8F-F764F26DF8F8"
}
]
}
]
}
],
"references": [
{
"url": "http://www.iss.net/security_center/static/9464.php",
"source": "cve@mitre.org"
},
{
"url": "http://www.securiteam.com/securitynews/5KP000A7QE.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}