var-200705-0412
Vulnerability from variot
The Cisco Intrusion Prevention System (IPS) and IOS with Firewall/IPS Feature Set do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic. Various HTTP content scanning systems fail to properly scan full-width/half-width Unicode encoded traffic. This may allow malicious HTTP traffic to bypass content scanning systems. A third party may use this issue to attempt further attacks. Attackers may send this type of HTTP data to evade detection and perform further attacks. Cisco has stated that all IOS releases that support the Firewall/IPS feature set are affected. Although we currently have no definitive list of such versions, Symantec is investigating the matter and will update this BID's list of vulnerable systems appropriately. Resin is a WEB server developed by Caucho Technology, which can be used under Microsoft Windows operating system. There are multiple vulnerabilities in the implementation of Resin for Windows, and remote attackers may use this vulnerability to obtain sensitive information without authorization. Resin does not properly filter input delivered via URL, allowing a remote attacker to read a continuous stream of data from any COM or LPT device on the system by supplying a DOS device filename with an arbitrary extension in the URL, exfiltrating Web pages through directory traversal attacks The contents of files in the application's WEB-INF directory, or the full system path to the Caucho Resin server through URLs containing special characters.
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors.
Download the free PSI BETA from the Secunia website: https://psi.secunia.com/
TITLE: Novell iChain HTTP Unicode Encoding Detection Bypass
SECUNIA ADVISORY ID: SA26692
VERIFY ADVISORY: http://secunia.com/advisories/26692/
CRITICAL: Less critical
IMPACT: Security Bypass
WHERE:
From remote
SOFTWARE: Novell iChain 2.x http://secunia.com/product/1423/
DESCRIPTION: A vulnerability has been reported in Novell iChain, which can be exploited by malicious people to bypass certain security restrictions.
SOLUTION: Apply iChain 2.3 SP5 Interim Release 3 or greater (2.3.408).
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: https://secure-support.novell.com/KanisaPlatform/Publishing/539/3193302_f.SAL_Public.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. Full-width and half-width is an encoding technique for Unicode characters.
Some Open Source or Microsoft Products such as Microsoft ISS and .NET Framework properly decode this type of encoding.
Risk Level : High
Impact : Security Bypass
Systems Affected :
Checkpoint Web Intelligence (Confirmed) IBM ISS Proventia Series (Confirmed) Full List of Vendors : (CERT - Vulnerability Note VU#739224) [1]
Remedy :
Contact your vendor for a hotfix, patch or advanced configuration.
Credits :
Fatih Ozavci (GamaTEAM Member) Caglar Cakici (GamaTEAM Member) It's detected using GamaSEC Exploit Framework GamaSEC Information Security Audit and Consulting Services (www.gamasec.net)
Original Advisory Link : http://www.gamasec.net/english/gs07-01.html
References :
-
CERT - Vulnerability Note VU#739224 http://www.kb.cert.org/vuls/id/739224
-
Unicode Home Page http://unicode.org
-
Unicode.org, Halfwidth and Fullwidth Forms http://www.unicode.org/charts/PDF/UFF00.pdf
-- Best Regards Fatih Ozavci IT Security Consultant .
2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively.
The vulnerability is reported in versions prior to 4.0.
SOLUTION: Update to version 4.0 or later.
Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure.
Join the FREE BETA test of the Network Software Inspector (NSI)! http://secunia.com/network_software_inspector/
The NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200705-0412", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios 12.3", "scope": null, "trust": 8.7, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t", "scope": null, "trust": 4.2, "vendor": "cisco", "version": null }, { "model": "ios 12.4", "scope": null, "trust": 2.1, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t8", "scope": null, "trust": 1.8, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 1.8, "vendor": "cisco", "version": "11.3" }, { "model": "ios", "scope": "eq", "trust": 1.8, "vendor": "cisco", "version": "12.0" }, { "model": "ios", "scope": "eq", "trust": 1.8, "vendor": "cisco", "version": "12.1" }, { "model": "ios", "scope": "eq", "trust": 1.8, "vendor": "cisco", "version": "12.2" }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "12.0st" }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "12.1t" }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "12.0t" }, { "model": "ios", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "12.1e" }, { "model": "ios 12.4 t", "scope": null, "trust": 1.5, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t4", "scope": null, "trust": 1.5, "vendor": "cisco", "version": null }, { "model": "intrusion prevention system 5.1", "scope": null, "trust": 1.5, "vendor": "cisco", "version": null }, { "model": "ios 12.3 ja", "scope": null, "trust": 1.2, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t2", "scope": null, "trust": 1.2, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 1.1, "vendor": "cisco", "version": "12.4" }, { "model": "ios", "scope": "eq", "trust": 1.1, "vendor": "cisco", "version": "12.3" }, { "model": "ips sensor software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(1c\\)" }, { "model": "ips sensor software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(2\\)" }, { "model": "ips sensor software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(1e\\)" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2t" }, { "model": "ips sensor software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(6\\)p1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.0s" }, { "model": "ips sensor software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0" }, { "model": "ips sensor software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(1b\\)" }, { "model": "ips sensor software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(1\\)" }, { "model": "ips sensor software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(1a\\)" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "10.0" }, { "model": "ips sensor software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(1d\\)" }, { "model": "ips sensor software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(1\\)" }, { "model": "ips sensor software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(p1\\)" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "11.1cc" }, { "model": "ios 12.4 t2", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t9", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t10", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "model": "ios 12.3 ja1", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "3com", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "internet security", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mcafee", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "novell", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "secure computing network security division", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "stonesoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "tippingpoint", "version": null }, { "model": "intrusion prevention system", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "11.0" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "11.1" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "11.2" }, { "model": "pix/asa", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.1" }, { "model": "pix/asa", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.2" }, { "model": "interscan gateway security appliance", "scope": null, "trust": 0.8, "vendor": "trend micro", "version": null }, { "model": "trendmicro interscan viruswall", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "none" }, { "model": "trendmicro interscan viruswall", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "standard edition" }, { "model": "trendmicro interscan web security suite", "scope": null, "trust": 0.8, "vendor": "trend micro", "version": null }, { "model": "ios 12.4 t1", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.4 mr", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.3 bc", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yg5", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yf", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t7", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t11", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.3 jk", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xe4", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t3", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t5", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "intrusion prevention system 5.0", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "intrusion prevention system", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.0" }, { "model": "intrusion prevention system", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.1\\(1\\)" }, { "model": "intrusion prevention system", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.0\\(2\\)" }, { "model": "intrusion prevention system", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.1\\(1c\\)" }, { "model": "intrusion prevention system", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.0\\(6\\)p1" }, { "model": "intrusion prevention system", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5.0\\(1\\)" }, { "model": "zpha", "scope": "eq", "trust": 0.3, "vendor": "tippingpoint", "version": "0" }, { "model": null, "scope": "eq", "trust": 0.3, "vendor": "tippingpoint", "version": "x5060" }, { "model": null, "scope": "eq", "trust": 0.3, "vendor": "tippingpoint", "version": "x5050" }, { "model": "sms", "scope": "eq", "trust": 0.3, "vendor": "tippingpoint", "version": "0" }, { "model": "600e", "scope": "eq", "trust": 0.3, "vendor": "tippingpoint", "version": "0" }, { "model": "5000e", "scope": "eq", "trust": 0.3, "vendor": "tippingpoint", "version": "0" }, { "model": null, "scope": "eq", "trust": 0.3, "vendor": "tippingpoint", "version": "500" }, { "model": "2400e", "scope": "eq", "trust": 0.3, "vendor": "tippingpoint", "version": "0" }, { "model": "200e", "scope": "eq", "trust": 0.3, "vendor": "tippingpoint", "version": "0" }, { "model": null, "scope": "eq", "trust": 0.3, "vendor": "tippingpoint", "version": "2000" }, { "model": "1200e", "scope": "eq", "trust": 0.3, "vendor": "tippingpoint", "version": "0" }, { "model": "stonegate ips sensor and analyzer", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.2" }, { "model": "stonegate ips sensor and analyzer", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0.1" }, { "model": "stonegate ips sensor and analyzer", "scope": "eq", "trust": 0.3, "vendor": "stonesoft", "version": "2.0" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.2" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.4.3" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.4" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0.1.4" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.(2.8)" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.(2.7)" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.(2.19)" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.(2.17)" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2.(2.16)" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2(2.15)" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2(2.14)" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2(2.10)" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.2(1)" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.(2.49)" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1.(2.48)" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1(2.5)" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.1(2)" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0(5.2)" }, { "model": "pix/asa", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7.0(5)" }, { "model": "pix series security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5007.1" }, { "model": "pix series security appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5007.0" }, { "model": "ios -7-ja2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3" }, { "model": "ios 12.4xt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.4xp", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.4xj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.4xg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.4xe", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.4xd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.4xc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.4xb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.4xa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.4t", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.4sw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.4mr", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.4(8)" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.4(7)" }, { "model": "ios 12.4 t6", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.4(5)" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.4(3)" }, { "model": "ios 12.4 xb2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.4 xb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.4 xa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.4 t4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.4 t3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.4 mr1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.4(12)" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.4(1)" }, { "model": "ios 12.3yz", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yu", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3ys", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yr", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yn", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3ym", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3ye", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3ya", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xz", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xy", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3xx" }, { "model": "ios 12.3xw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3xv" }, { "model": "ios 12.3xu", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xs", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xr", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xn", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xm", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xe", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3tpc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3t", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3jx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3jl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3jk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3jeb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3jea", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3ja", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3bw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3bc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3b", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 bc7", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 bc6", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 bc2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3(9)" }, { "model": "ios 12.3 yi3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yi1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yg3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yg2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yg1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 ya1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xy6", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xy5", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xy4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xu2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3(7.7)" }, { "model": "ios 12.3 xr6", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xr4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xr3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xi9", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xi8a", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xi7", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xi4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xi3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t12", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 jx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3(6)" }, { "model": "ios 12.3 b5", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 b2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 b", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 b1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3(5)" }, { "model": "ios 12.3 xq1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xk4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xk3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xk1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xg5", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xg4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xg2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xg1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xd2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xd1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 tpc11a", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t13", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 eo1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3(21)" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3(20)" }, { "model": "ios 12.3 xe3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xc4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xc3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xc2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xc1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xa5", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xa4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 jl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 jk1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 ja5", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3(18)" }, { "model": "ios 12.3 bc3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3(16)" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3(15)" }, { "model": "ios 12.3 yx2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yu1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yu", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yt1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yq8", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yq4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yq3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yq1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 ym8", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 ym4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 bc1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3(13)" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3(12)" }, { "model": "ios 12.3 yz1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 ys1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 ys", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yr", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yn", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yk2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yk1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yf4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yf3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yf2", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xl3", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t6", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3(11)" }, { "model": "ios 12.3 a", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3(10)" }, { "model": "intrustion prevention software 5.1", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0(3)" }, { "model": "intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0(2)" }, { "model": "intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0(1)" }, { "model": "intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1(2)" }, { "model": "intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1(1)" }, { "model": "intrusion prevention system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.x" }, { "model": "stonegate ips", "scope": "ne", "trust": 0.3, "vendor": "stonesoft", "version": "4.1" }, { "model": "stonegate ips", "scope": "ne", "trust": 0.3, "vendor": "stonesoft", "version": "4.0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#739224" }, { "db": "BID", "id": "23980" }, { "db": "JVNDB", "id": "JVNDB-2007-000382" }, { "db": "CNNVD", "id": "CNNVD-200705-315" }, { "db": "NVD", "id": "CVE-2007-2688" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:cisco:intrusion_prevention_system", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:ios", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:pix_asa", "vulnerable": true }, { "cpe22Uri": "cpe:/h:trendmicro:interscan_gateway_security_appliance", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:interscan_viruswall", "vulnerable": true }, { "cpe22Uri": "cpe:/a:trendmicro:interscan_web_security_suite", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000382" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Derek Abdine", "sources": [ { "db": "CNNVD", "id": "CNNVD-200705-315" } ], "trust": 0.6 }, "cve": "CVE-2007-2688", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2007-2688", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-26050", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-2688", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#739224", "trust": 0.8, "value": "1.76" }, { "author": "NVD", "id": "CVE-2007-2688", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200705-315", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-26050", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#739224" }, { "db": "VULHUB", "id": "VHN-26050" }, { "db": "JVNDB", "id": "JVNDB-2007-000382" }, { "db": "CNNVD", "id": "CNNVD-200705-315" }, { "db": "NVD", "id": "CVE-2007-2688" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Cisco Intrusion Prevention System (IPS) and IOS with Firewall/IPS Feature Set do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic. Various HTTP content scanning systems fail to properly scan full-width/half-width Unicode encoded traffic. This may allow malicious HTTP traffic to bypass content scanning systems. A third party may use this issue to attempt further attacks. \nAttackers may send this type of HTTP data to evade detection and perform further attacks. \nCisco has stated that all IOS releases that support the Firewall/IPS feature set are affected. Although we currently have no definitive list of such versions, Symantec is investigating the matter and will update this BID\u0027s list of vulnerable systems appropriately. Resin is a WEB server developed by Caucho Technology, which can be used under Microsoft Windows operating system. There are multiple vulnerabilities in the implementation of Resin for Windows, and remote attackers may use this vulnerability to obtain sensitive information without authorization. Resin does not properly filter input delivered via URL, allowing a remote attacker to read a continuous stream of data from any COM or LPT device on the system by supplying a DOS device filename with an arbitrary extension in the URL, exfiltrating Web pages through directory traversal attacks The contents of files in the application\u0027s WEB-INF directory, or the full system path to the Caucho Resin server through URLs containing special characters. \n\n----------------------------------------------------------------------\n\nBETA test the new Secunia Personal Software Inspector!\n\nThe Secunia PSI detects installed software on your computer and\ncategorises it as either Insecure, End-of-Life, or Up-To-Date. \nEffectively enabling you to focus your attention on software\ninstallations where more secure versions are available from the\nvendors. \n\nDownload the free PSI BETA from the Secunia website:\nhttps://psi.secunia.com/\n\n----------------------------------------------------------------------\n\nTITLE:\nNovell iChain HTTP Unicode Encoding Detection Bypass\n\nSECUNIA ADVISORY ID:\nSA26692\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/26692/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nSecurity Bypass\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nNovell iChain 2.x\nhttp://secunia.com/product/1423/\n\nDESCRIPTION:\nA vulnerability has been reported in Novell iChain, which can be\nexploited by malicious people to bypass certain security\nrestrictions. \n\nSOLUTION:\nApply iChain 2.3 SP5 Interim Release 3 or greater (2.3.408). \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttps://secure-support.novell.com/KanisaPlatform/Publishing/539/3193302_f.SAL_Public.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. Full-width and half-width is an encoding technique for Unicode\ncharacters. \n\nSome Open Source or Microsoft Products such as Microsoft ISS and .NET\nFramework properly decode this type of encoding. \n\nRisk Level : High\n\nImpact : Security Bypass\n\nSystems Affected :\n\nCheckpoint Web Intelligence (Confirmed)\nIBM ISS Proventia Series (Confirmed)\nFull List of Vendors : (CERT - Vulnerability Note VU#739224) [1]\n\nRemedy :\n\nContact your vendor for a hotfix, patch or advanced configuration. \n\nCredits :\n\nFatih Ozavci (GamaTEAM Member)\nCaglar Cakici (GamaTEAM Member)\nIt\u0027s detected using GamaSEC Exploit Framework\nGamaSEC Information Security Audit and Consulting Services\n(www.gamasec.net)\n\nOriginal Advisory Link :\nhttp://www.gamasec.net/english/gs07-01.html\n\nReferences :\n\n 1. CERT - Vulnerability Note VU#739224\n http://www.kb.cert.org/vuls/id/739224\n\n 2. Unicode Home Page\n http://unicode.org\n\n 3. Unicode.org, Halfwidth and Fullwidth Forms\n http://www.unicode.org/charts/PDF/UFF00.pdf\n\n\n-- \nBest Regards\nFatih Ozavci\nIT Security Consultant\n. \n\n----------------------------------------------------------------------\n\n2003: 2,700 advisories published\n2004: 3,100 advisories published\n2005: 4,600 advisories published\n2006: 5,300 advisories published\n\nHow do you know which Secunia advisories are important to you?\n\nThe Secunia Vulnerability Intelligence Solutions allows you to filter\nand structure all the information you need, so you can address issues\neffectively. \n\nThe vulnerability is reported in versions prior to 4.0. \n\nSOLUTION:\nUpdate to version 4.0 or later. \n\n----------------------------------------------------------------------\n\nTry a new way to discover vulnerabilities that ALREADY EXIST in your\nIT infrastructure. \n\nJoin the FREE BETA test of the Network Software Inspector (NSI)!\nhttp://secunia.com/network_software_inspector/\n\nThe NSI enables you to INSPECT, DISCOVER, and DOCUMENT\nvulnerabilities in more than 4,000 different Windows applications", "sources": [ { "db": "NVD", "id": "CVE-2007-2688" }, { "db": "CERT/CC", "id": "VU#739224" }, { "db": "JVNDB", "id": "JVNDB-2007-000382" }, { "db": "BID", "id": "23980" }, { "db": "VULHUB", "id": "VHN-26050" }, { "db": "PACKETSTORM", "id": "59116" }, { "db": "PACKETSTORM", "id": "56796" }, { "db": "PACKETSTORM", "id": "60653" }, { "db": "PACKETSTORM", "id": "56741" } ], "trust": 3.06 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#739224", "trust": 3.9 }, { "db": "SECUNIA", "id": "25285", "trust": 3.5 }, { "db": "BID", "id": "23980", "trust": 2.8 }, { "db": "NVD", "id": "CVE-2007-2688", "trust": 2.8 }, { "db": "SECTRACK", "id": "1018053", "trust": 2.5 }, { "db": "SECTRACK", "id": "1018054", "trust": 2.5 }, { "db": "OSVDB", "id": "35336", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2007-1803", "trust": 1.7 }, { "db": "XF", "id": "34277", "trust": 1.4 }, { "db": "SECUNIA", "id": "27455", "trust": 1.0 }, { "db": "SECUNIA", "id": "26692", "trust": 0.9 }, { "db": "SECUNIA", "id": "25302", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2007-000382", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200705-315", "trust": 0.7 }, { "db": "CISCO", "id": "20070514 HTTP FULL-WIDTH AND HALF-WIDTH UNICODE ENCODING EVASION", "trust": 0.6 }, { "db": "NSFOCUS", "id": "10343\u203b10344", "trust": 0.6 }, { "db": "NSFOCUS", "id": "10343", "trust": 0.6 }, { "db": "NSFOCUS", "id": "10344", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:5465", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20070515 GS07-01 FULL-WIDTH AND HALF-WIDTH UNICODE ENCODING IDS/IPS/WAF BYPASS VULNERABILITY", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-26050", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "59116", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "56796", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "60653", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "56741", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#739224" }, { "db": "VULHUB", "id": "VHN-26050" }, { "db": "BID", "id": "23980" }, { "db": "JVNDB", "id": "JVNDB-2007-000382" }, { "db": "PACKETSTORM", "id": "59116" }, { "db": "PACKETSTORM", "id": "56796" }, { "db": "PACKETSTORM", "id": "60653" }, { "db": "PACKETSTORM", "id": "56741" }, { "db": "CNNVD", "id": "CNNVD-200705-315" }, { "db": "NVD", "id": "CVE-2007-2688" } ] }, "id": "VAR-200705-0412", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-26050" } ], "trust": 0.69181416 }, "last_update_date": "2024-11-23T21:49:04.821000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sr-20070514-unicode", "trust": 0.8, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20070514-unicode.shtml" }, { "title": "solution 2061840", "trust": 0.8, "url": "http://esupport.trendmicro.co.jp/supportjp/viewxml.do?ContentID=JP-2061840" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000382" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2007-2688" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://www.gamasec.net/english/gs07-01.html" }, { "trust": 3.1, "url": "http://www.kb.cert.org/vuls/id/739224" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/23980" }, { "trust": 2.5, "url": "http://www.securitytracker.com/id?1018053" }, { "trust": 2.5, "url": "http://www.securitytracker.com/id?1018054" }, { "trust": 1.7, "url": "http://secunia.com/advisories/25285/" }, { "trust": 1.7, "url": "http://www.cisco.com/en/us/products/products_security_response09186a008083f82e.html" }, { "trust": 1.7, "url": "http://www.osvdb.org/35336" }, { "trust": 1.7, "url": "http://secunia.com/advisories/25285" }, { "trust": 1.4, "url": "http://www.frsirt.com/english/advisories/2007/1803" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/34277" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/468633/100/0/threaded" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5465" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2007/1803" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34277" }, { "trust": 0.9, "url": "http://www.unicode.org/charts/pdf/uff00.pdf" }, { "trust": 0.9, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20070514-unicode.shtml" }, { "trust": 0.9, "url": "https://secure-support.novell.com/kanisaplatform/publishing/539/3193302_f.sal_public.html" }, { "trust": 0.9, "url": "http://secunia.com/advisories/26692/" }, { "trust": 0.9, "url": "http://secunia.com/advisories/27455/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/25302/" }, { "trust": 0.8, "url": "http://www.frsirt.com/english/advisories/2007/1817" }, { "trust": 0.8, "url": "http://www.securityfocus.com/infocus/1232" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/alerts/id/advise68" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2688" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2688" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/468633/100/0/threaded" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5465" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/10343\u203b10344" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/sw/secursw/ps2113/" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/products_security_response09186a008083f82e.html#response" }, { "trust": 0.3, "url": "/archive/1/468633" }, { "trust": 0.3, "url": "http://www.3com.com/securityalert/alerts/3com-07-001.html" }, { "trust": 0.3, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.3, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.3, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "https://psi.secunia.com/" }, { "trust": 0.1, "url": "http://secunia.com/product/1423/" }, { "trust": 0.1, "url": "http://unicode.org" }, { "trust": 0.1, "url": "https://www.gamasec.net)" }, { "trust": 0.1, "url": "http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv" }, { "trust": 0.1, "url": "https://my.stonesoft.com/download.do" }, { "trust": 0.1, "url": "http://secunia.com/product/16421/" }, { "trust": 0.1, "url": "http://secunia.com/network_software_inspector/" }, { "trust": 0.1, "url": "http://secunia.com/product/5600/" }, { "trust": 0.1, "url": "http://secunia.com/product/722/" }, { "trust": 0.1, "url": "http://secunia.com/product/721/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#739224" }, { "db": "VULHUB", "id": "VHN-26050" }, { "db": "BID", "id": "23980" }, { "db": "JVNDB", "id": "JVNDB-2007-000382" }, { "db": "PACKETSTORM", "id": "59116" }, { "db": "PACKETSTORM", "id": "56796" }, { "db": "PACKETSTORM", "id": "60653" }, { "db": "PACKETSTORM", "id": "56741" }, { "db": "CNNVD", "id": "CNNVD-200705-315" }, { "db": "NVD", "id": "CVE-2007-2688" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#739224" }, { "db": "VULHUB", "id": "VHN-26050" }, { "db": "BID", "id": "23980" }, { "db": "JVNDB", "id": "JVNDB-2007-000382" }, { "db": "PACKETSTORM", "id": "59116" }, { "db": "PACKETSTORM", "id": "56796" }, { "db": "PACKETSTORM", "id": "60653" }, { "db": "PACKETSTORM", "id": "56741" }, { "db": "CNNVD", "id": "CNNVD-200705-315" }, { "db": "NVD", "id": "CVE-2007-2688" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-05-14T00:00:00", "db": "CERT/CC", "id": "VU#739224" }, { "date": "2007-05-16T00:00:00", "db": "VULHUB", "id": "VHN-26050" }, { "date": "2007-05-14T00:00:00", "db": "BID", "id": "23980" }, { "date": "2007-05-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000382" }, { "date": "2007-09-07T06:01:27", "db": "PACKETSTORM", "id": "59116" }, { "date": "2007-05-17T00:35:37", "db": "PACKETSTORM", "id": "56796" }, { "date": "2007-11-03T02:36:00", "db": "PACKETSTORM", "id": "60653" }, { "date": "2007-05-16T01:04:41", "db": "PACKETSTORM", "id": "56741" }, { "date": "2007-05-15T00:00:00", "db": "CNNVD", "id": "CNNVD-200705-315" }, { "date": "2007-05-16T01:19:00", "db": "NVD", "id": "CVE-2007-2688" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-04-22T00:00:00", "db": "CERT/CC", "id": "VU#739224" }, { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-26050" }, { "date": "2016-07-05T22:20:00", "db": "BID", "id": "23980" }, { "date": "2007-06-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000382" }, { "date": "2009-03-04T00:00:00", "db": "CNNVD", "id": "CNNVD-200705-315" }, { "date": "2024-11-21T00:31:24.767000", "db": "NVD", "id": "CVE-2007-2688" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200705-315" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HTTP content scanning systems full-width/half-width Unicode encoding bypass", "sources": [ { "db": "CERT/CC", "id": "VU#739224" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "23980" }, { "db": "CNNVD", "id": "CNNVD-200705-315" } ], "trust": 0.9 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.