CVE-2004-0051

Current Description

Multiple content security gateway and antivirus products allow remote attackers to bypass content restrictions via MIME messages that use non-standard but frequently supported Content-Transfer-Encoding values such as (1) uuencode, (2) mac-binhex40, and (3) yenc, which may be interpreted differently by mail clients.

Basic Data

PublishedOctober 20, 2004
Last ModifiedJuly 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationClearswiftMailsweeper4.3.7*******
    2.3ApplicationClearswiftMailsweeper4.3.8*******
    2.3ApplicationClearswiftMailsweeper4.3.10*******
    2.3ApplicationClearswiftMailsweeper4.3.11*******
    2.3ApplicationClearswiftMailsweeper4.3.13*******
    2.3ApplicationClearswiftMailsweeper4.3.14*******
    2.3ApplicationClearswiftMailsweeper4.3.15*******
    2.3ApplicationF-secureInternet Gatekeeper6.3*******
    2.3ApplicationF-secureInternet Gatekeeper6.4*******
    2.3ApplicationF-secureInternet Gatekeeper6.31*******
    2.3ApplicationF-secureInternet Gatekeeper6.32*******
    2.3ApplicationPaul L DanielsRipmime1.2.0*******
    2.3ApplicationPaul L DanielsRipmime1.2.1*******
    2.3ApplicationPaul L DanielsRipmime1.2.2*******
    2.3ApplicationPaul L DanielsRipmime1.2.3*******
    2.3ApplicationPaul L DanielsRipmime1.2.4*******
    2.3ApplicationPaul L DanielsRipmime1.2.5*******
    2.3ApplicationPaul L DanielsRipmime1.2.6*******
    2.3ApplicationPaul L DanielsRipmime1.2.7*******
    2.3ApplicationPaul L DanielsRipmime1.3.2.0*******
    2.3ApplicationPaul L DanielsRipmime1.3.2.2*******
    2.3ApplicationPaul L DanielsRipmime1.3.2.3*******

Vulnerable Software List

VendorProductVersions
Clearswift Mailsweeper 4.3.10, 4.3.11, 4.3.13, 4.3.14, 4.3.15, 4.3.7, 4.3.8
F-secure Internet Gatekeeper 6.3, 6.31, 6.32, 6.4
Paul L Daniels Ripmime 1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.2.7, 1.3.2.0, 1.3.2.2, 1.3.2.3

References

NameSourceURLTags
20040914 Corsaire Security Advisory - Multiple vendor MIME Content-Transfer-Encoding mechanism issuehttp://marc.info/?l=bugtraq&m=109517788100063&w=2BUGTRAQ
http://www.uniras.gov.uk/vuls/2004/380375/mime.htmhttp://www.uniras.gov.uk/vuls/2004/380375/mime.htmMISCVendor Advisory
mime-contenttransfer-filter-bypass(17337)https://exchange.xforce.ibmcloud.com/vulnerabilities/17337XF