Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may be interpreted differently by mail clients.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Mailsweeper | Clearswift | 4.3.7 (including) | 4.3.7 (including) |
Mailsweeper | Clearswift | 4.3.8 (including) | 4.3.8 (including) |
Mailsweeper | Clearswift | 4.3.10 (including) | 4.3.10 (including) |
Mailsweeper | Clearswift | 4.3.11 (including) | 4.3.11 (including) |
Mailsweeper | Clearswift | 4.3.13 (including) | 4.3.13 (including) |
Mailsweeper | Clearswift | 4.3.14 (including) | 4.3.14 (including) |
Mailsweeper | Clearswift | 4.3.15 (including) | 4.3.15 (including) |
Internet_gatekeeper | F-secure | 6.3 (including) | 6.3 (including) |
Internet_gatekeeper | F-secure | 6.4 (including) | 6.4 (including) |
Internet_gatekeeper | F-secure | 6.31 (including) | 6.31 (including) |
Internet_gatekeeper | F-secure | 6.32 (including) | 6.32 (including) |
Ripmime | Paul_l_daniels | 1.2.0 (including) | 1.2.0 (including) |
Ripmime | Paul_l_daniels | 1.2.1 (including) | 1.2.1 (including) |
Ripmime | Paul_l_daniels | 1.2.2 (including) | 1.2.2 (including) |
Ripmime | Paul_l_daniels | 1.2.3 (including) | 1.2.3 (including) |
Ripmime | Paul_l_daniels | 1.2.4 (including) | 1.2.4 (including) |
Ripmime | Paul_l_daniels | 1.2.5 (including) | 1.2.5 (including) |
Ripmime | Paul_l_daniels | 1.2.6 (including) | 1.2.6 (including) |
Ripmime | Paul_l_daniels | 1.2.7 (including) | 1.2.7 (including) |
Ripmime | Paul_l_daniels | 1.3.2.0 (including) | 1.3.2.0 (including) |
Ripmime | Paul_l_daniels | 1.3.2.2 (including) | 1.3.2.2 (including) |
Ripmime | Paul_l_daniels | 1.3.2.3 (including) | 1.3.2.3 (including) |