vendor:
VirusWall
by:
BeyondSecurity's SecurITeam
7.5
CVSS
HIGH
Bypassing Scanning Mechanism
20
CWE
Product Name: VirusWall
Affected Version From: VirusWall versions
Affected Version To: VirusWall versions
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2002
Bypassing VirusWall Scanning Mechanism
A vulnerability has been reported in certain VirusWall versions. Reportedly, it is possible to bypass the scanning mechanism of VirusWall by adding extraneous spaces in certain email HTTP header fields. A malicious email server may add extraneous whitespace in certain email headers. This would cause VirusWall to ignore the malicious email and not scan it. However, many popular email client programs, including Outlook, will ignore this header and display the content regardless. This may allow malicious content to bypass VirusWall and still be interpreted by a client system.
Mitigation:
Vendor has released a patch to address this vulnerability.