ID CVE-2007-2690
Summary Multiple IBM ISS Proventia Series products, including the A, G, and M series, do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic.
References
Vulnerable Configurations
  • cpe:2.3:h:iss:proventia_a_series_xpu:20.11:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_a_series_xpu:20.11:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_a_series_xpu:22.1:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_a_series_xpu:22.1:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_a_series_xpu:22.2:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_a_series_xpu:22.2:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_a_series_xpu:22.3:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_a_series_xpu:22.3:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_a_series_xpu:22.4:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_a_series_xpu:22.4:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_a_series_xpu:22.5:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_a_series_xpu:22.5:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_a_series_xpu:22.6:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_a_series_xpu:22.6:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_a_series_xpu:-:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_a_series_xpu:-:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_a_series_xpu:20.15:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_a_series_xpu:20.15:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_a_series_xpu:22.7:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_a_series_xpu:22.7:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_a_series_xpu:22.8:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_a_series_xpu:22.8:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_a_series_xpu:22.9:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_a_series_xpu:22.9:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_a_series_xpu:22.10:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_a_series_xpu:22.10:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_g_series_xpu:22.1:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_g_series_xpu:22.1:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_g_series_xpu:22.2:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_g_series_xpu:22.2:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_g_series_xpu:22.3:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_g_series_xpu:22.3:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_g_series_xpu:22.4:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_g_series_xpu:22.4:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_g_series_xpu:22.5:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_g_series_xpu:22.5:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_g_series_xpu:22.6:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_g_series_xpu:22.6:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_g_series_xpu:22.7:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_g_series_xpu:22.7:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_g_series_xpu:22.8:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_g_series_xpu:22.8:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_g_series_xpu:22.9:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_g_series_xpu:22.9:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_g_series_xpu:22.10:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_g_series_xpu:22.10:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_g_series_xpu:-:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_g_series_xpu:-:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_g_series_xpu:22.11:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_g_series_xpu:22.11:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_m_series_xpu:1.1:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_m_series_xpu:1.1:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_m_series_xpu:1.2:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_m_series_xpu:1.2:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_m_series_xpu:1.3:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_m_series_xpu:1.3:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_m_series_xpu:1.4:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_m_series_xpu:1.4:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_m_series_xpu:1.5:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_m_series_xpu:1.5:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_m_series_xpu:1.6:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_m_series_xpu:1.6:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_m_series_xpu:1.7:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_m_series_xpu:1.7:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_m_series_xpu:1.8:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_m_series_xpu:1.8:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_m_series_xpu:-:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_m_series_xpu:-:*:*:*:*:*:*:*
  • cpe:2.3:h:iss:proventia_m_series_xpu:1.9:*:*:*:*:*:*:*
    cpe:2.3:h:iss:proventia_m_series_xpu:1.9:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 16-10-2018 - 16:45)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:C
refmap via4
bugtraq 20070515 GS07-01 Full-Width and Half-Width Unicode Encoding IDS/IPS/WAF Bypass Vulnerability
cert-vn VU#739224
misc http://www.gamasec.net/english/gs07-01.html
sectrack 1018068
Last major update 16-10-2018 - 16:45
Published 16-05-2007 - 01:19
Last modified 16-10-2018 - 16:45
Back to Top