Vulnerability Description
Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header set to 0, which is often ignored by HTTP clients.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trend Micro | Interscan Viruswall | 3.6 |
References
- http://seclists.org/lists/bugtraq/2002/Mar/0162.html
- http://www.inside-security.de/vwall_cl0.html
- http://www.iss.net/security_center/static/8425.php
- http://www.securityfocus.com/bid/4265PatchVendor Advisory
- http://seclists.org/lists/bugtraq/2002/Mar/0162.html
- http://www.inside-security.de/vwall_cl0.html
- http://www.iss.net/security_center/static/8425.php
- http://www.securityfocus.com/bid/4265PatchVendor Advisory
FAQ
What is CVE-2002-0440?
CVE-2002-0440 is a vulnerability with a CVSS score of 7.5 (HIGH). Trend Micro InterScan VirusWall HTTP proxy 3.6 with the "Skip scanning if Content-length equals 0" option enabled allows malicious web servers to bypass content scanning via a Content-length header se...
How severe is CVE-2002-0440?
CVE-2002-0440 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-0440?
Check the references section above for vendor advisories and patch information. Affected products include: Trend Micro Interscan Viruswall.