ID

VAR-200705-0412


CVE

CVE-2007-2688


TITLE

HTTP content scanning systems full-width/half-width Unicode encoding bypass

Trust: 0.8

sources: CERT/CC: VU#739224

DESCRIPTION

The Cisco Intrusion Prevention System (IPS) and IOS with Firewall/IPS Feature Set do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic. Various HTTP content scanning systems fail to properly scan full-width/half-width Unicode encoded traffic. This may allow malicious HTTP traffic to bypass content scanning systems. A third party may use this issue to attempt further attacks. Attackers may send this type of HTTP data to evade detection and perform further attacks. Cisco has stated that all IOS releases that support the Firewall/IPS feature set are affected. Although we currently have no definitive list of such versions, Symantec is investigating the matter and will update this BID's list of vulnerable systems appropriately. Resin is a WEB server developed by Caucho Technology, which can be used under Microsoft Windows operating system. There are multiple vulnerabilities in the implementation of Resin for Windows, and remote attackers may use this vulnerability to obtain sensitive information without authorization. Resin does not properly filter input delivered via URL, allowing a remote attacker to read a continuous stream of data from any COM or LPT device on the system by supplying a DOS device filename with an arbitrary extension in the URL, exfiltrating Web pages through directory traversal attacks The contents of files in the application's WEB-INF directory, or the full system path to the Caucho Resin server through URLs containing special characters. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Novell iChain HTTP Unicode Encoding Detection Bypass SECUNIA ADVISORY ID: SA26692 VERIFY ADVISORY: http://secunia.com/advisories/26692/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote SOFTWARE: Novell iChain 2.x http://secunia.com/product/1423/ DESCRIPTION: A vulnerability has been reported in Novell iChain, which can be exploited by malicious people to bypass certain security restrictions. SOLUTION: Apply iChain 2.3 SP5 Interim Release 3 or greater (2.3.408). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: https://secure-support.novell.com/KanisaPlatform/Publishing/539/3193302_f.SAL_Public.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Full-width and half-width is an encoding technique for Unicode characters. Some Open Source or Microsoft Products such as Microsoft ISS and .NET Framework properly decode this type of encoding. Risk Level : High Impact : Security Bypass Systems Affected : Checkpoint Web Intelligence (Confirmed) IBM ISS Proventia Series (Confirmed) Full List of Vendors : (CERT - Vulnerability Note VU#739224) [1] Remedy : Contact your vendor for a hotfix, patch or advanced configuration. Credits : Fatih Ozavci (GamaTEAM Member) Caglar Cakici (GamaTEAM Member) It's detected using GamaSEC Exploit Framework GamaSEC Information Security Audit and Consulting Services (www.gamasec.net) Original Advisory Link : http://www.gamasec.net/english/gs07-01.html References : 1. CERT - Vulnerability Note VU#739224 http://www.kb.cert.org/vuls/id/739224 2. Unicode Home Page http://unicode.org 3. Unicode.org, Halfwidth and Fullwidth Forms http://www.unicode.org/charts/PDF/UFF00.pdf -- Best Regards Fatih Ozavci IT Security Consultant . ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. The vulnerability is reported in versions prior to 4.0. SOLUTION: Update to version 4.0 or later. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. Join the FREE BETA test of the Network Software Inspector (NSI)! http://secunia.com/network_software_inspector/ The NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications

Trust: 3.06

sources: NVD: CVE-2007-2688 // CERT/CC: VU#739224 // JVNDB: JVNDB-2007-000382 // BID: 23980 // VULHUB: VHN-26050 // PACKETSTORM: 59116 // PACKETSTORM: 56796 // PACKETSTORM: 60653 // PACKETSTORM: 56741

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.3scope: - version: -

Trust: 8.7

vendor:ciscomodel:ios 12.3 tscope: - version: -

Trust: 4.2

vendor:ciscomodel:ios 12.4scope: - version: -

Trust: 2.1

vendor:ciscomodel:ios 12.3 t8scope: - version: -

Trust: 1.8

vendor:ciscomodel:iosscope:eqversion:11.3

Trust: 1.8

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 1.8

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 1.8

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 1.8

vendor:ciscomodel:iosscope:eqversion:12.0st

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.1t

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.0t

Trust: 1.6

vendor:ciscomodel:iosscope:eqversion:12.1e

Trust: 1.6

vendor:ciscomodel:ios 12.4 tscope: - version: -

Trust: 1.5

vendor:ciscomodel:ios 12.3 t4scope: - version: -

Trust: 1.5

vendor:ciscomodel:intrusion prevention system 5.1scope: - version: -

Trust: 1.5

vendor:ciscomodel:ios 12.3 jascope: - version: -

Trust: 1.2

vendor:ciscomodel:ios 12.3 t2scope: - version: -

Trust: 1.2

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 1.1

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 1.1

vendor:ciscomodel:ips sensor softwarescope:eqversion:5.1\(1d\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:11.1cc

Trust: 1.0

vendor:ciscomodel:ips sensor softwarescope:eqversion:5.1\(1\)

Trust: 1.0

vendor:ciscomodel:ips sensor softwarescope:eqversion:5.1\(1e\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:10.0

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.2t

Trust: 1.0

vendor:ciscomodel:ips sensor softwarescope:eqversion:4.0

Trust: 1.0

vendor:ciscomodel:ips sensor softwarescope:eqversion:5.1\(1a\)

Trust: 1.0

vendor:ciscomodel:ips sensor softwarescope:eqversion:5.0\(6\)p1

Trust: 1.0

vendor:ciscomodel:ips sensor softwarescope:eqversion:5.0\(1\)

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:12.0s

Trust: 1.0

vendor:ciscomodel:ips sensor softwarescope:eqversion:5.0\(2\)

Trust: 1.0

vendor:ciscomodel:ips sensor softwarescope:eqversion:5.1\(1b\)

Trust: 1.0

vendor:ciscomodel:ips sensor softwarescope:eqversion:5.1\(p1\)

Trust: 1.0

vendor:ciscomodel:ips sensor softwarescope:eqversion:5.1\(1c\)

Trust: 1.0

vendor:ciscomodel:ios 12.4 t2scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.3 t9scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.3 t10scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.3 ja1scope: - version: -

Trust: 0.9

vendor:3commodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:internet securitymodel: - scope: - version: -

Trust: 0.8

vendor:mcafeemodel: - scope: - version: -

Trust: 0.8

vendor:novellmodel: - scope: - version: -

Trust: 0.8

vendor:secure computing network security divisionmodel: - scope: - version: -

Trust: 0.8

vendor:stonesoftmodel: - scope: - version: -

Trust: 0.8

vendor:tippingpointmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:intrusion prevention systemscope: - version: -

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:11.0

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:11.1

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:11.2

Trust: 0.8

vendor:ciscomodel:pix/asascope:eqversion:7.1

Trust: 0.8

vendor:ciscomodel:pix/asascope:eqversion:7.2

Trust: 0.8

vendor:trend micromodel:interscan gateway security appliancescope: - version: -

Trust: 0.8

vendor:trend micromodel:trendmicro interscan viruswallscope:eqversion:none

Trust: 0.8

vendor:trend micromodel:trendmicro interscan viruswallscope:eqversion:standard edition

Trust: 0.8

vendor:trend micromodel:trendmicro interscan web security suitescope: - version: -

Trust: 0.8

vendor:ciscomodel:ios 12.4 t1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.4 mrscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 bcscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 yg5scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 yfscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 t7scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 t11scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 jkscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 xe4scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 t3scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 t5scope: - version: -

Trust: 0.6

vendor:ciscomodel:intrusion prevention system 5.0scope: - version: -

Trust: 0.6

vendor:ciscomodel:intrusion prevention systemscope:eqversion:4.0

Trust: 0.6

vendor:ciscomodel:intrusion prevention systemscope:eqversion:5.1\(1\)

Trust: 0.6

vendor:ciscomodel:intrusion prevention systemscope:eqversion:5.0\(2\)

Trust: 0.6

vendor:ciscomodel:intrusion prevention systemscope:eqversion:5.1\(1c\)

Trust: 0.6

vendor:ciscomodel:intrusion prevention systemscope:eqversion:5.0\(6\)p1

Trust: 0.6

vendor:ciscomodel:intrusion prevention systemscope:eqversion:5.0\(1\)

Trust: 0.6

vendor:tippingpointmodel:zphascope:eqversion:0

Trust: 0.3

vendor:tippingpointmodel: - scope:eqversion:x5060

Trust: 0.3

vendor:tippingpointmodel: - scope:eqversion:x5050

Trust: 0.3

vendor:tippingpointmodel:smsscope:eqversion:0

Trust: 0.3

vendor:tippingpointmodel:600escope:eqversion:0

Trust: 0.3

vendor:tippingpointmodel:5000escope:eqversion:0

Trust: 0.3

vendor:tippingpointmodel: - scope:eqversion:500

Trust: 0.3

vendor:tippingpointmodel:2400escope:eqversion:0

Trust: 0.3

vendor:tippingpointmodel:200escope:eqversion:0

Trust: 0.3

vendor:tippingpointmodel: - scope:eqversion:2000

Trust: 0.3

vendor:tippingpointmodel:1200escope:eqversion:0

Trust: 0.3

vendor:stonesoftmodel:stonegate ips sensor and analyzerscope:eqversion:2.0.2

Trust: 0.3

vendor:stonesoftmodel:stonegate ips sensor and analyzerscope:eqversion:2.0.1

Trust: 0.3

vendor:stonesoftmodel:stonegate ips sensor and analyzerscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.4.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.1.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.8)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.7)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.19)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.17)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.16)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.15)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.14)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.10)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.49)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.48)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.5)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(5.2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(5)

Trust: 0.3

vendor:ciscomodel:pix series security appliancescope:eqversion:5007.1

Trust: 0.3

vendor:ciscomodel:pix series security appliancescope:eqversion:5007.0

Trust: 0.3

vendor:ciscomodel:ios -7-ja2scope:eqversion:12.3

Trust: 0.3

vendor:ciscomodel:ios 12.4xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4swscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4(8)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4(7)

Trust: 0.3

vendor:ciscomodel:ios 12.4 t6scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4(5)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4(3)

Trust: 0.3

vendor:ciscomodel:ios 12.4 xb2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 mr1scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4(12)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4(1)

Trust: 0.3

vendor:ciscomodel:ios 12.3yzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ywscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ynscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ymscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ylscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 0.3

vendor:ciscomodel:ios 12.3xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3xv

Trust: 0.3

vendor:ciscomodel:ios 12.3xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tpcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jebscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jeascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 bc7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 bc6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 bc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(9)

Trust: 0.3

vendor:ciscomodel:ios 12.3 yi3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yi1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yg3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yg2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yg1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ya1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xy6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xy5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xy4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xu2scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(7.7)

Trust: 0.3

vendor:ciscomodel:ios 12.3 xr6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xr4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xr3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xi9scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xi8ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xi7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xi4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xi3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t12scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 jxscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(6)

Trust: 0.3

vendor:ciscomodel:ios 12.3 b5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 b2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 b1scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(5)

Trust: 0.3

vendor:ciscomodel:ios 12.3 xq1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xk4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xk3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xk1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xg5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xg4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xg2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xg1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xd2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xd1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 tpc11ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t13scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 eo1scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(21)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(20)

Trust: 0.3

vendor:ciscomodel:ios 12.3 xe3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xc4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xc3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xc1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xa5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xa4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 jlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 jk1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ja5scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(18)

Trust: 0.3

vendor:ciscomodel:ios 12.3 bc3scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(16)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(15)

Trust: 0.3

vendor:ciscomodel:ios 12.3 yx2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yu1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yt1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yq8scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yq4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yq3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yq1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ym8scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ym4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 bc1scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(13)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(12)

Trust: 0.3

vendor:ciscomodel:ios 12.3 yz1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ywscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ys1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ynscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ylscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yk2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yk1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yf4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yf3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yf2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xl3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t6scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(11)

Trust: 0.3

vendor:ciscomodel:ios 12.3 ascope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(10)

Trust: 0.3

vendor:ciscomodel:intrustion prevention software 5.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:intrusion prevention systemscope:eqversion:5.0(3)

Trust: 0.3

vendor:ciscomodel:intrusion prevention systemscope:eqversion:5.0(2)

Trust: 0.3

vendor:ciscomodel:intrusion prevention systemscope:eqversion:5.0(1)

Trust: 0.3

vendor:ciscomodel:intrusion prevention systemscope:eqversion:5.1(2)

Trust: 0.3

vendor:ciscomodel:intrusion prevention systemscope:eqversion:5.1(1)

Trust: 0.3

vendor:ciscomodel:intrusion prevention systemscope:eqversion:4.x

Trust: 0.3

vendor:stonesoftmodel:stonegate ipsscope:neversion:4.1

Trust: 0.3

vendor:stonesoftmodel:stonegate ipsscope:neversion:4.0

Trust: 0.3

sources: CERT/CC: VU#739224 // BID: 23980 // JVNDB: JVNDB-2007-000382 // CNNVD: CNNVD-200705-315 // NVD: CVE-2007-2688

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-2688
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#739224
value: 1.76

Trust: 0.8

NVD: CVE-2007-2688
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200705-315
value: HIGH

Trust: 0.6

VULHUB: VHN-26050
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-2688
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-26050
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#739224 // VULHUB: VHN-26050 // JVNDB: JVNDB-2007-000382 // CNNVD: CNNVD-200705-315 // NVD: CVE-2007-2688

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-2688

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200705-315

TYPE

Design Error

Trust: 0.9

sources: BID: 23980 // CNNVD: CNNVD-200705-315

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-000382

PATCH

title:cisco-sr-20070514-unicodeurl:http://www.cisco.com/warp/public/707/cisco-sr-20070514-unicode.shtml

Trust: 0.8

title:solution 2061840url:http://esupport.trendmicro.co.jp/supportjp/viewxml.do?ContentID=JP-2061840

Trust: 0.8

sources: JVNDB: JVNDB-2007-000382

EXTERNAL IDS

db:CERT/CCid:VU#739224

Trust: 3.9

db:SECUNIAid:25285

Trust: 3.5

db:BIDid:23980

Trust: 2.8

db:NVDid:CVE-2007-2688

Trust: 2.8

db:SECTRACKid:1018053

Trust: 2.5

db:SECTRACKid:1018054

Trust: 2.5

db:OSVDBid:35336

Trust: 1.7

db:VUPENid:ADV-2007-1803

Trust: 1.7

db:XFid:34277

Trust: 1.4

db:SECUNIAid:27455

Trust: 1.0

db:SECUNIAid:26692

Trust: 0.9

db:SECUNIAid:25302

Trust: 0.8

db:JVNDBid:JVNDB-2007-000382

Trust: 0.8

db:CNNVDid:CNNVD-200705-315

Trust: 0.7

db:CISCOid:20070514 HTTP FULL-WIDTH AND HALF-WIDTH UNICODE ENCODING EVASION

Trust: 0.6

db:NSFOCUSid:10343※10344

Trust: 0.6

db:NSFOCUSid:10343

Trust: 0.6

db:NSFOCUSid:10344

Trust: 0.6

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:5465

Trust: 0.6

db:BUGTRAQid:20070515 GS07-01 FULL-WIDTH AND HALF-WIDTH UNICODE ENCODING IDS/IPS/WAF BYPASS VULNERABILITY

Trust: 0.6

db:VULHUBid:VHN-26050

Trust: 0.1

db:PACKETSTORMid:59116

Trust: 0.1

db:PACKETSTORMid:56796

Trust: 0.1

db:PACKETSTORMid:60653

Trust: 0.1

db:PACKETSTORMid:56741

Trust: 0.1

sources: CERT/CC: VU#739224 // VULHUB: VHN-26050 // BID: 23980 // JVNDB: JVNDB-2007-000382 // PACKETSTORM: 59116 // PACKETSTORM: 56796 // PACKETSTORM: 60653 // PACKETSTORM: 56741 // CNNVD: CNNVD-200705-315 // NVD: CVE-2007-2688

REFERENCES

url:http://www.gamasec.net/english/gs07-01.html

Trust: 3.1

url:http://www.kb.cert.org/vuls/id/739224

Trust: 3.1

url:http://www.securityfocus.com/bid/23980

Trust: 2.5

url:http://www.securitytracker.com/id?1018053

Trust: 2.5

url:http://www.securitytracker.com/id?1018054

Trust: 2.5

url:http://secunia.com/advisories/25285/

Trust: 1.7

url:http://www.cisco.com/en/us/products/products_security_response09186a008083f82e.html

Trust: 1.7

url:http://www.osvdb.org/35336

Trust: 1.7

url:http://secunia.com/advisories/25285

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/1803

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/34277

Trust: 1.4

url:http://www.securityfocus.com/archive/1/468633/100/0/threaded

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5465

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/1803

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/34277

Trust: 1.1

url:http://www.unicode.org/charts/pdf/uff00.pdf

Trust: 0.9

url:http://www.cisco.com/warp/public/707/cisco-sr-20070514-unicode.shtml

Trust: 0.9

url:https://secure-support.novell.com/kanisaplatform/publishing/539/3193302_f.sal_public.html

Trust: 0.9

url:http://secunia.com/advisories/26692/

Trust: 0.9

url:http://secunia.com/advisories/27455/

Trust: 0.9

url:http://secunia.com/advisories/25302/

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/1817

Trust: 0.8

url:http://www.securityfocus.com/infocus/1232

Trust: 0.8

url:http://xforce.iss.net/xforce/alerts/id/advise68

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2688

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2688

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/468633/100/0/threaded

Trust: 0.6

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5465

Trust: 0.6

url:http://www.nsfocus.net/vulndb/10343※10344

Trust: 0.6

url:http://www.cisco.com/en/us/products/sw/secursw/ps2113/

Trust: 0.3

url:http://www.cisco.com/en/us/products/products_security_response09186a008083f82e.html#response

Trust: 0.3

url:/archive/1/468633

Trust: 0.3

url:http://www.3com.com/securityalert/alerts/3com-07-001.html

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.3

url:http://secunia.com/about_secunia_advisories/

Trust: 0.3

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/1423/

Trust: 0.1

url:http://unicode.org

Trust: 0.1

url:https://www.gamasec.net)

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:https://my.stonesoft.com/download.do

Trust: 0.1

url:http://secunia.com/product/16421/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/product/5600/

Trust: 0.1

url:http://secunia.com/product/722/

Trust: 0.1

url:http://secunia.com/product/721/

Trust: 0.1

sources: CERT/CC: VU#739224 // VULHUB: VHN-26050 // BID: 23980 // JVNDB: JVNDB-2007-000382 // PACKETSTORM: 59116 // PACKETSTORM: 56796 // PACKETSTORM: 60653 // PACKETSTORM: 56741 // CNNVD: CNNVD-200705-315 // NVD: CVE-2007-2688

CREDITS

Derek Abdine

Trust: 0.6

sources: CNNVD: CNNVD-200705-315

SOURCES

db:CERT/CCid:VU#739224
db:VULHUBid:VHN-26050
db:BIDid:23980
db:JVNDBid:JVNDB-2007-000382
db:PACKETSTORMid:59116
db:PACKETSTORMid:56796
db:PACKETSTORMid:60653
db:PACKETSTORMid:56741
db:CNNVDid:CNNVD-200705-315
db:NVDid:CVE-2007-2688

LAST UPDATE DATE

2025-04-10T23:07:32.781000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#739224date:2009-04-22T00:00:00
db:VULHUBid:VHN-26050date:2018-10-30T00:00:00
db:BIDid:23980date:2016-07-05T22:20:00
db:JVNDBid:JVNDB-2007-000382date:2007-06-27T00:00:00
db:CNNVDid:CNNVD-200705-315date:2009-03-04T00:00:00
db:NVDid:CVE-2007-2688date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#739224date:2007-05-14T00:00:00
db:VULHUBid:VHN-26050date:2007-05-16T00:00:00
db:BIDid:23980date:2007-05-14T00:00:00
db:JVNDBid:JVNDB-2007-000382date:2007-05-31T00:00:00
db:PACKETSTORMid:59116date:2007-09-07T06:01:27
db:PACKETSTORMid:56796date:2007-05-17T00:35:37
db:PACKETSTORMid:60653date:2007-11-03T02:36:00
db:PACKETSTORMid:56741date:2007-05-16T01:04:41
db:CNNVDid:CNNVD-200705-315date:2007-05-15T00:00:00
db:NVDid:CVE-2007-2688date:2007-05-16T01:19:00