2 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Clearswift MAILsweeper for SMTP before 4.3.20 and MAILsweeper for Exchange before 4.3.20 allows remote attackers to bypass the "text analysis", possibly bypassing SPAM and other filters, by sending an e-mail specifying a non-existent or unrecognized character set. Clearswift MAILsweeper para SMTP anterior a v4.3.20 y MAILsweeper para Exchange anterior a anterior a v4.3.20 permite a atacantes remotos evitar el "text analysis", posiblemente evitando SPAM y otros filtros, mediante el envió de un e-mail especificando un conjunto de caracteres no existente. • http://download.mimesweeper.com/www/TechnicalDocumentation/ReadMe_MSW_4%2C3%2C20.htm http://secunia.com/advisories/20756 http://www.osvdb.org/26737 http://www.securityfocus.com/bid/18584 http://www.vupen.com/english/advisories/2006/2473 https://exchange.xforce.ibmcloud.com/vulnerabilities/27301 •

CVSS: 5.0EPSS: 3%CPEs: 2EXPL: 0

Clearswift MAILsweeper for SMTP before 4.3.20 and MAILsweeper for Exchange before 4.3.20 allows remote attackers to cause a denial of service via (1) non-ASCII characters in a reverse DNS lookup result from a Received header, which leads to a Receiver service stop, and (2) unspecified vectors involving malformed messages, which causes "unpredictable behavior" that prevents the Security service from processing more messages. Clearswift MAILsweeper para SMTP anterior a v4.3.20 y MAILsweeper para Exchange anterior a v4.3.20 permite a atacantes remotos provocar una denegación de servicio a través de (1) caracteres "no-ASCII" en un resultado de búsqueda de DNS inversa desde una cabecera Received, que lleva a una parada del servicio Receiver, y (2) vectores sin especificar que tienen que ver con mensajes mal formados que provocan un "comportamiento impredecible" que impide al servicio Security procesar más mensajes • http://download.mimesweeper.com/www/TechnicalDocumentation/ReadMe_MSW_4%2C3%2C20.htm http://secunia.com/advisories/20756 http://www.osvdb.org/26738 http://www.osvdb.org/26739 http://www.securityfocus.com/bid/18584 http://www.vupen.com/english/advisories/2006/2473 https://exchange.xforce.ibmcloud.com/vulnerabilities/27303 https://exchange.xforce.ibmcloud.com/vulnerabilities/27305 •