Vulnerabilites related to paul_l_daniels - ripmime
CVE-2004-0051 (GCVE-0-2004-0051)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 00:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may be interpreted differently by mail clients.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:01:23.610Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME Content-Transfer-Encoding mechanism issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109517788100063\u0026w=2" }, { "name": "mime-contenttransfer-filter-bypass(17337)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17337" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may be interpreted differently by mail clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME Content-Transfer-Encoding mechanism issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109517788100063\u0026w=2" }, { "name": "mime-contenttransfer-filter-bypass(17337)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17337" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0051", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may be interpreted differently by mail clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME Content-Transfer-Encoding mechanism issue", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109517788100063\u0026w=2" }, { "name": "mime-contenttransfer-filter-bypass(17337)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17337" }, { "name": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0051", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2004-01-14T00:00:00", "dateUpdated": "2024-08-08T00:01:23.610Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-2620 (GCVE-0-2004-2620)
Vulnerability from cvelistv5
Published
2005-12-04 22:00
Modified
2024-09-17 00:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The MIMEH_read_headers function in ripMIME 1.3.1.0 does not properly handle trailing "\r" and "\n" characters in headers, which leads to a buffer underflow.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:36:24.476Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "8731", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/8731" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.pldaniels.com/ripmime/CHANGELOG" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The MIMEH_read_headers function in ripMIME 1.3.1.0 does not properly handle trailing \"\\r\" and \"\\n\" characters in headers, which leads to a buffer underflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-12-04T22:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "8731", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/8731" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.pldaniels.com/ripmime/CHANGELOG" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2620", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MIMEH_read_headers function in ripMIME 1.3.1.0 does not properly handle trailing \"\\r\" and \"\\n\" characters in headers, which leads to a buffer underflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "8731", "refsource": "OSVDB", "url": "http://www.osvdb.org/8731" }, { "name": "http://www.pldaniels.com/ripmime/CHANGELOG", "refsource": "CONFIRM", "url": "http://www.pldaniels.com/ripmime/CHANGELOG" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2620", "datePublished": "2005-12-04T22:00:00Z", "dateReserved": "2005-12-04T00:00:00Z", "dateUpdated": "2024-09-17T00:50:58.280Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1015 (GCVE-0-2003-1015)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 02:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use whitespace in an unusual fashion, which may be interpreted differently by mail clients.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:12:35.561Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field whitespace issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109525252118936\u0026w=2" }, { "name": "mime-tools-incorrect-concatenation(9273)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9273" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use whitespace in an unusual fashion, which may be interpreted differently by mail clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field whitespace issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109525252118936\u0026w=2" }, { "name": "mime-tools-incorrect-concatenation(9273)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9273" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1015", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use whitespace in an unusual fashion, which may be interpreted differently by mail clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field whitespace issue", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109525252118936\u0026w=2" }, { "name": "mime-tools-incorrect-concatenation(9273)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9273" }, { "name": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1015", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2003-12-17T00:00:00", "dateUpdated": "2024-08-08T02:12:35.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-0198 (GCVE-0-2002-0198)
Vulnerability from cvelistv5
Published
2002-05-03 04:00
Modified
2024-08-08 02:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in plDaniels ripMime 1.2.6 and earlier, as used in other programs such as xamime and inflex, allows remote attackers to execute arbitrary code via an attachment in a long filename.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:42:28.394Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20020122 pldaniels - ripMime 1.2.6 and lower?", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=101182636812381\u0026w=2" }, { "name": "ripmime-long-filename-bo(7983)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7983.php" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://pldaniels.org/ripmime/CHANGELOG" }, { "name": "3941", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3941" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-01-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in plDaniels ripMime 1.2.6 and earlier, as used in other programs such as xamime and inflex, allows remote attackers to execute arbitrary code via an attachment in a long filename." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20020122 pldaniels - ripMime 1.2.6 and lower?", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=101182636812381\u0026w=2" }, { "name": "ripmime-long-filename-bo(7983)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7983.php" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://pldaniels.org/ripmime/CHANGELOG" }, { "name": "3941", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3941" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0198", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in plDaniels ripMime 1.2.6 and earlier, as used in other programs such as xamime and inflex, allows remote attackers to execute arbitrary code via an attachment in a long filename." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20020122 pldaniels - ripMime 1.2.6 and lower?", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=101182636812381\u0026w=2" }, { "name": "ripmime-long-filename-bo(7983)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7983.php" }, { "name": "http://pldaniels.org/ripmime/CHANGELOG", "refsource": "CONFIRM", "url": "http://pldaniels.org/ripmime/CHANGELOG" }, { "name": "3941", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3941" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0198", "datePublished": "2002-05-03T04:00:00", "dateReserved": "2002-05-01T00:00:00", "dateUpdated": "2024-08-08T02:42:28.394Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0161 (GCVE-0-2004-0161)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 00:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use RFC2231 encoding, which may be interpreted differently by mail clients.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:10:03.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC2231 encoding issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109524928232568\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-tools-parameter-encoding(9274)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9274" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use RFC2231 encoding, which may be interpreted differently by mail clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC2231 encoding issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109524928232568\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-tools-parameter-encoding(9274)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9274" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0161", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use RFC2231 encoding, which may be interpreted differently by mail clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC2231 encoding issue", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109524928232568\u0026w=2" }, { "name": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-tools-parameter-encoding(9274)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9274" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0161", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2004-02-18T00:00:00", "dateUpdated": "2024-08-08T00:10:03.382Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-2619 (GCVE-0-2004-2619)
Vulnerability from cvelistv5
Published
2005-12-04 22:00
Modified
2024-08-08 01:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
ripMIME 1.3.2.3 and earlier allows remote attackers to bypass e-mail protection via a base64 MIME encoded attachment containing invalid characters that are not properly extracted.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:36:24.638Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "8287", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/8287" }, { "name": "ripmime-attachment-filters-bypass(16867)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16867" }, { "name": "10848", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10848" }, { "name": "12201", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12201" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.pldaniels.com/ripmime/CHANGELOG" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "ripMIME 1.3.2.3 and earlier allows remote attackers to bypass e-mail protection via a base64 MIME encoded attachment containing invalid characters that are not properly extracted." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "8287", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/8287" }, { "name": "ripmime-attachment-filters-bypass(16867)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16867" }, { "name": "10848", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10848" }, { "name": "12201", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12201" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.pldaniels.com/ripmime/CHANGELOG" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-2619", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ripMIME 1.3.2.3 and earlier allows remote attackers to bypass e-mail protection via a base64 MIME encoded attachment containing invalid characters that are not properly extracted." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "8287", "refsource": "OSVDB", "url": "http://www.osvdb.org/8287" }, { "name": "ripmime-attachment-filters-bypass(16867)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16867" }, { "name": "10848", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10848" }, { "name": "12201", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12201" }, { "name": "http://www.pldaniels.com/ripmime/CHANGELOG", "refsource": "CONFIRM", "url": "http://www.pldaniels.com/ripmime/CHANGELOG" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-2619", "datePublished": "2005-12-04T22:00:00", "dateReserved": "2005-12-04T00:00:00", "dateUpdated": "2024-08-08T01:36:24.638Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0052 (GCVE-0-2004-0052)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 00:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard separator characters, or use standard separators incorrectly, within MIME headers, fields, parameters, or values, which may be interpreted differently by mail clients.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:01:23.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mime-separator-filtering-bypass(17334)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17334" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME separator issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109517669115891\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard separator characters, or use standard separators incorrectly, within MIME headers, fields, parameters, or values, which may be interpreted differently by mail clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mime-separator-filtering-bypass(17334)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17334" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME separator issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109517669115891\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard separator characters, or use standard separators incorrectly, within MIME headers, fields, parameters, or values, which may be interpreted differently by mail clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mime-separator-filtering-bypass(17334)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17334" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME separator issue", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109517669115891\u0026w=2" }, { "name": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0052", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2004-01-14T00:00:00", "dateUpdated": "2024-08-08T00:01:23.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0053 (GCVE-0-2004-0053)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 00:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use fields that use RFC2047 encoding, which may be interpreted differently by mail clients.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:01:23.649Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-rfc2047-filtering-bypass(17331)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17331" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC2047 encoding issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109520704408739\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use fields that use RFC2047 encoding, which may be interpreted differently by mail clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-rfc2047-filtering-bypass(17331)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17331" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC2047 encoding issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109520704408739\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use fields that use RFC2047 encoding, which may be interpreted differently by mail clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-rfc2047-filtering-bypass(17331)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17331" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC2047 encoding issue", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109520704408739\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0053", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2004-01-14T00:00:00", "dateUpdated": "2024-08-08T00:01:23.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1016 (GCVE-0-2003-1016)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 02:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use malformed quoting in MIME headers, parameters, and values, including (1) fields that should not be quoted, (2) duplicate quotes, or (3) missing leading or trailing quote characters, which may be interpreted differently by mail clients.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:12:35.543Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mime-quote-filtering-bypass(17336)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17336" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field quoting issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109521027007616\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use malformed quoting in MIME headers, parameters, and values, including (1) fields that should not be quoted, (2) duplicate quotes, or (3) missing leading or trailing quote characters, which may be interpreted differently by mail clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mime-quote-filtering-bypass(17336)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17336" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field quoting issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109521027007616\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1016", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use malformed quoting in MIME headers, parameters, and values, including (1) fields that should not be quoted, (2) duplicate quotes, or (3) missing leading or trailing quote characters, which may be interpreted differently by mail clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mime-quote-filtering-bypass(17336)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17336" }, { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field quoting issue", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109521027007616\u0026w=2" }, { "name": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1016", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2003-12-17T00:00:00", "dateUpdated": "2024-08-08T02:12:35.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2004-0162 (GCVE-0-2004-0162)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 00:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME encapsulation that uses RFC822 comment fields, which may be interpreted as other fields by mail clients.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:10:03.544Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC822 comment issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109517563513776\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-rfc822-filtering-bypass(17332)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17332" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME encapsulation that uses RFC822 comment fields, which may be interpreted as other fields by mail clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC822 comment issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109517563513776\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-rfc822-filtering-bypass(17332)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17332" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0162", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME encapsulation that uses RFC822 comment fields, which may be interpreted as other fields by mail clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME RFC822 comment issue", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109517563513776\u0026w=2" }, { "name": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-rfc822-filtering-bypass(17332)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17332" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0162", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2004-02-18T00:00:00", "dateUpdated": "2024-08-08T00:10:03.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1014 (GCVE-0-2003-1014)
Vulnerability from cvelistv5
Published
2004-09-24 04:00
Modified
2024-08-08 02:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use multiple MIME fields with the same name, which may be interpreted differently by mail clients.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:12:35.312Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field multiple occurrence issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109517732328759\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-field-filtering-bypass(17333)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17333" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use multiple MIME fields with the same name, which may be interpreted differently by mail clients." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field multiple occurrence issue", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=109517732328759\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-field-filtering-bypass(17333)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17333" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1014", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use multiple MIME fields with the same name, which may be interpreted differently by mail clients." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040914 Corsaire Security Advisory - Multiple vendor MIME field multiple occurrence issue", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=109517732328759\u0026w=2" }, { "name": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm", "refsource": "MISC", "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "name": "mime-field-filtering-bypass(17333)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17333" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1014", "datePublished": "2004-09-24T04:00:00", "dateReserved": "2003-12-17T00:00:00", "dateUpdated": "2024-08-08T02:12:35.312Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use malformed quoting in MIME headers, parameters, and values, including (1) fields that should not be quoted, (2) duplicate quotes, or (3) missing leading or trailing quote characters, which may be interpreted differently by mail clients.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
clearswift | mailsweeper | 4.3.14 | |
clearswift | mailsweeper | 4.3.15 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 | |
paul_l_daniels | ripmime | 1.3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use malformed quoting in MIME headers, parameters, and values, including (1) fields that should not be quoted, (2) duplicate quotes, or (3) missing leading or trailing quote characters, which may be interpreted differently by mail clients." }, { "lang": "es", "value": "M\u00faltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan entrecomillado malformado en cabeceras MIME, par\u00e1metros y valores, incluyendo (1) campos que no deber\u00edan ser entrecomillados, (2) comillas duplicadas, o (3) falta de caract\u00e9res al principio o al final, lo que puede ser interpretado de manera distinta por clientes de correo electr\u00f3nico." } ], "id": "CVE-2003-1016", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109521027007616\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109521027007616\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17336" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use RFC2231 encoding, which may be interpreted differently by mail clients.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
clearswift | mailsweeper | 4.3.14 | |
clearswift | mailsweeper | 4.3.15 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 | |
paul_l_daniels | ripmime | 1.3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use RFC2231 encoding, which may be interpreted differently by mail clients." }, { "lang": "es", "value": "M\u00faltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan codificicaci\u00f3n RFC2231, lo que puede ser interpretado de forma variable por clientes de correo." } ], "id": "CVE-2004-0161", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109524928232568\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109524928232568\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9274" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
ripMIME 1.3.2.3 and earlier allows remote attackers to bypass e-mail protection via a base64 MIME encoded attachment containing invalid characters that are not properly extracted.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paul_l_daniels | ripmime | * | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:*:*:*:*:*:*:*:*", "matchCriteriaId": "631CE139-C22E-4282-8E7D-CC19A3376A0F", "versionEndIncluding": "1.3.2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ripMIME 1.3.2.3 and earlier allows remote attackers to bypass e-mail protection via a base64 MIME encoded attachment containing invalid characters that are not properly extracted." } ], "id": "CVE-2004-2619", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/12201" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/8287" }, { "source": "cve@mitre.org", "url": "http://www.pldaniels.com/ripmime/CHANGELOG" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/10848" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/12201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/8287" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.pldaniels.com/ripmime/CHANGELOG" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/10848" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16867" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may be interpreted differently by mail clients.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
clearswift | mailsweeper | 4.3.14 | |
clearswift | mailsweeper | 4.3.15 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 | |
paul_l_daniels | ripmime | 1.3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may be interpreted differently by mail clients." }, { "lang": "es", "value": "M\u00faltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan valores Content-Transfer-Encoding no est\u00e1ndar pero ampliamente soportados, como (1) uuencode, (2) mac-binhex40, y (3) yenc, lo que puede ser interpretado de manera distinta por clientes de correo." } ], "id": "CVE-2004-0051", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109517788100063\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17337" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109517788100063\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17337" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-05-16 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in plDaniels ripMime 1.2.6 and earlier, as used in other programs such as xamime and inflex, allows remote attackers to execute arbitrary code via an attachment in a long filename.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paul_l_daniels | inflex | 1.0.10 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paul_l_daniels:inflex:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "AD8D188C-20CD-47D0-BCA5-E4E055C8CA3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in plDaniels ripMime 1.2.6 and earlier, as used in other programs such as xamime and inflex, allows remote attackers to execute arbitrary code via an attachment in a long filename." }, { "lang": "es", "value": "Desbordamiento de buffer en plDaniels ripMime 1.2.6 y anteriores, usados en programas como xamime y inflex, permiten a atacantes remotos ejecutar c\u00f3digo arbitrario mediante un adjunto en un nombre de fichero largo." } ], "id": "CVE-2002-0198", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-05-16T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=101182636812381\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://pldaniels.org/ripmime/CHANGELOG" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/7983.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/3941" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=101182636812381\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://pldaniels.org/ripmime/CHANGELOG" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/7983.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/3941" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The MIMEH_read_headers function in ripMIME 1.3.1.0 does not properly handle trailing "\r" and "\n" characters in headers, which leads to a buffer underflow.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paul_l_daniels | ripmime | 1.3.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "78D557AA-70D0-4E3C-A64A-9CD50786D268", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The MIMEH_read_headers function in ripMIME 1.3.1.0 does not properly handle trailing \"\\r\" and \"\\n\" characters in headers, which leads to a buffer underflow." } ], "id": "CVE-2004-2620", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.osvdb.org/8731" }, { "source": "cve@mitre.org", "url": "http://www.pldaniels.com/ripmime/CHANGELOG" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.osvdb.org/8731" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.pldaniels.com/ripmime/CHANGELOG" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use multiple MIME fields with the same name, which may be interpreted differently by mail clients.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
clearswift | mailsweeper | 4.3.14 | |
clearswift | mailsweeper | 4.3.15 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 | |
paul_l_daniels | ripmime | 1.3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": false }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": false }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": false }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": false }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": false }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5", "vulnerable": false }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F", "vulnerable": false }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": false }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": false }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": false }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": false }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use multiple MIME fields with the same name, which may be interpreted differently by mail clients." }, { "lang": "es", "value": "M\u00faltiples pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan m\u00faltiples campos MIME con el mismo nombre, lo que puede ser interpretado de manera distinta por clientes de correo." } ], "id": "CVE-2003-1014", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109517732328759\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109517732328759\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17333" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard separator characters, or use standard separators incorrectly, within MIME headers, fields, parameters, or values, which may be interpreted differently by mail clients.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
clearswift | mailsweeper | 4.3.14 | |
clearswift | mailsweeper | 4.3.15 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 | |
paul_l_daniels | ripmime | 1.3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard separator characters, or use standard separators incorrectly, within MIME headers, fields, parameters, or values, which may be interpreted differently by mail clients." }, { "lang": "es", "value": "M\u00faltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan caract\u00e9res de separaci\u00f3n no est\u00e1ndar, o usan separadores est\u00e1ndar de manera incorrecta, dentro de cabeceras, campos, par\u00e1metros o valores MIME, lo que puede ser interpretado de manera diferente por clientes de correo." } ], "id": "CVE-2004-0052", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109517669115891\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109517669115891\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17334" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use fields that use RFC2047 encoding, which may be interpreted differently by mail clients.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
clearswift | mailsweeper | 4.3.14 | |
clearswift | mailsweeper | 4.3.15 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 | |
paul_l_daniels | ripmime | 1.3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use fields that use RFC2047 encoding, which may be interpreted differently by mail clients." }, { "lang": "es", "value": "M\u00faltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan campos con codificaci\u00f3n RFC2047, lo que puede ser interpretado de manera diferente por clientes de correo." } ], "id": "CVE-2004-0053", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109520704408739\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109520704408739\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17331" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME encapsulation that uses RFC822 comment fields, which may be interpreted as other fields by mail clients.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
clearswift | mailsweeper | 4.3.14 | |
clearswift | mailsweeper | 4.3.15 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 | |
paul_l_daniels | ripmime | 1.3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME encapsulation that uses RFC822 comment fields, which may be interpreted as other fields by mail clients." }, { "lang": "es", "value": "M\u00faltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante encapsulaci\u00f3n MIME que usa campos de comentarios RFC822, lo que puede ser interpretado como otros campos por clientes de correo." } ], "id": "CVE-2004-0162", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109517563513776\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109517563513776\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17332" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-10-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use whitespace in an unusual fashion, which may be interpreted differently by mail clients.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
clearswift | mailsweeper | 4.3.7 | |
clearswift | mailsweeper | 4.3.8 | |
clearswift | mailsweeper | 4.3.10 | |
clearswift | mailsweeper | 4.3.11 | |
clearswift | mailsweeper | 4.3.13 | |
clearswift | mailsweeper | 4.3.14 | |
clearswift | mailsweeper | 4.3.15 | |
f-secure | internet_gatekeeper | 6.3 | |
f-secure | internet_gatekeeper | 6.4 | |
f-secure | internet_gatekeeper | 6.31 | |
f-secure | internet_gatekeeper | 6.32 | |
paul_l_daniels | ripmime | 1.2.0 | |
paul_l_daniels | ripmime | 1.2.1 | |
paul_l_daniels | ripmime | 1.2.2 | |
paul_l_daniels | ripmime | 1.2.3 | |
paul_l_daniels | ripmime | 1.2.4 | |
paul_l_daniels | ripmime | 1.2.5 | |
paul_l_daniels | ripmime | 1.2.6 | |
paul_l_daniels | ripmime | 1.2.7 | |
paul_l_daniels | ripmime | 1.3.2.0 | |
paul_l_daniels | ripmime | 1.3.2.2 | |
paul_l_daniels | ripmime | 1.3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "CA12B965-672C-444D-9774-0F76FE47EA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "E6C9B32C-5EC9-46BD-AA77-F414A143576C", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "823C27EB-C00F-4A7E-B832-013A50A1EE2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "BD217379-28E7-465E-843D-E7204EE0E89F", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "EB96CB8A-59F3-4624-B2BA-687ECF929B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "04A02C12-547E-4086-A409-53AA68F1A4D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:clearswift:mailsweeper:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "8185FBF2-D678-4D90-A5AC-F9B06DFED95F", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F4EC2BB-A979-4C37-B8BB-086DAEEB4A6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD53E1BC-6A92-4D7C-BE1F-FEF88F78DBD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.31:*:*:*:*:*:*:*", "matchCriteriaId": "AC782BFC-6BA0-4823-8A6D-F7D83F55393C", "vulnerable": true }, { "criteria": "cpe:2.3:a:f-secure:internet_gatekeeper:6.32:*:*:*:*:*:*:*", "matchCriteriaId": "E1B09025-47B9-4F77-9DA6-80885E9A4EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E021143-608B-44A2-84FB-8F8AC00A9985", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0A9BB1C1-2CB2-426D-A8CE-AF5CB0B98674", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AC4686E-B92F-47ED-90DA-42AF650521D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "80EF73F0-1FE1-4041-9C07-A89D153DA41F", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF45C4F8-A20C-4D7D-B203-AF36FB046C63", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "75222D1B-1384-4C74-A54F-BC028C5CDB69", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "A5129FD4-C011-4EA9-B8A1-256E95494FE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8F33D78C-9CD1-49A6-A43E-D0187600C033", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6D3CF1D-64E1-47DB-8767-EF8DBF4E17AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E725208-BA0C-41D9-BC45-84577A94AAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paul_l_daniels:ripmime:1.3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A43C3DCC-3298-4D4D-9485-4A3BECB615E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use whitespace in an unusual fashion, which may be interpreted differently by mail clients." }, { "lang": "es", "value": "M\u00faltiples productos de pasarelas de seguridad de contenidos y antivirus pueden permitir a atacantes remotos saltarse restricciones de contenido mediante mensajes MIME que usan espacios en blanco de manera inusual, lo que puede ser interpretado diferentemente por clientes de correo." } ], "id": "CVE-2003-1015", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109525252118936\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109525252118936\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/vuls/2004/380375/mime.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/9273" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }