ID

VAR-200705-0413


CVE

CVE-2007-2689


TITLE

HTTP content scanning systems full-width/half-width Unicode encoding bypass

Trust: 0.8

sources: CERT/CC: VU#739224

DESCRIPTION

Check Point Web Intelligence does not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic. Various HTTP content scanning systems fail to properly scan full-width/half-width Unicode encoded traffic. This may allow malicious HTTP traffic to bypass content scanning systems. Web Intelligence is prone to a remote security vulnerability. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Novell iChain HTTP Unicode Encoding Detection Bypass SECUNIA ADVISORY ID: SA26692 VERIFY ADVISORY: http://secunia.com/advisories/26692/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote SOFTWARE: Novell iChain 2.x http://secunia.com/product/1423/ DESCRIPTION: A vulnerability has been reported in Novell iChain, which can be exploited by malicious people to bypass certain security restrictions. SOLUTION: Apply iChain 2.3 SP5 Interim Release 3 or greater (2.3.408). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: https://secure-support.novell.com/KanisaPlatform/Publishing/539/3193302_f.SAL_Public.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Full-width and half-width is an encoding technique for Unicode characters. Some Open Source or Microsoft Products such as Microsoft ISS and .NET Framework properly decode this type of encoding. Risk Level : High Impact : Security Bypass Systems Affected : Checkpoint Web Intelligence (Confirmed) IBM ISS Proventia Series (Confirmed) Full List of Vendors : (CERT - Vulnerability Note VU#739224) [1] Remedy : Contact your vendor for a hotfix, patch or advanced configuration. Credits : Fatih Ozavci (GamaTEAM Member) Caglar Cakici (GamaTEAM Member) It's detected using GamaSEC Exploit Framework GamaSEC Information Security Audit and Consulting Services (www.gamasec.net) Original Advisory Link : http://www.gamasec.net/english/gs07-01.html References : 1. CERT - Vulnerability Note VU#739224 http://www.kb.cert.org/vuls/id/739224 2. Unicode Home Page http://unicode.org 3. Unicode.org, Halfwidth and Fullwidth Forms http://www.unicode.org/charts/PDF/UFF00.pdf -- Best Regards Fatih Ozavci IT Security Consultant . ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. The vulnerability is reported in versions prior to 4.0. SOLUTION: Update to version 4.0 or later. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. Join the FREE BETA test of the Network Software Inspector (NSI)! http://secunia.com/network_software_inspector/ The NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. The vulnerability affects the following products: * Cisco Intrusion Prevention System (IPS) * Cisco IOS with Firewall/IPS Feature Set SOLUTION: No fix or workaround is currently available

Trust: 3.15

sources: NVD: CVE-2007-2689 // CERT/CC: VU#739224 // JVNDB: JVNDB-2007-001193 // BID: 86147 // VULHUB: VHN-26051 // VULMON: CVE-2007-2689 // PACKETSTORM: 59116 // PACKETSTORM: 56796 // PACKETSTORM: 60653 // PACKETSTORM: 56741

AFFECTED PRODUCTS

vendor:checkpointmodel:web intelligencescope:eqversion:gold

Trust: 1.6

vendor:3commodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:internet securitymodel: - scope: - version: -

Trust: 0.8

vendor:mcafeemodel: - scope: - version: -

Trust: 0.8

vendor:novellmodel: - scope: - version: -

Trust: 0.8

vendor:secure computing network security divisionmodel: - scope: - version: -

Trust: 0.8

vendor:stonesoftmodel: - scope: - version: -

Trust: 0.8

vendor:tippingpointmodel: - scope: - version: -

Trust: 0.8

vendor:check pointmodel:connectrascope:eqversion:2.0

Trust: 0.8

vendor:check pointmodel:connectra ngxscope:eqversion:r60

Trust: 0.8

vendor:check pointmodel:connectra ngxscope:eqversion:r61

Trust: 0.8

vendor:check pointmodel:connectra ngxscope:eqversion:r62

Trust: 0.8

vendor:check pointmodel:connectra ngxscope:eqversion:r65

Trust: 0.8

vendor:check pointmodel:vpn-1 power/utmscope:eqversion:(pro/express) ng ai r55

Trust: 0.8

vendor:check pointmodel:vpn-1 power/utmscope:eqversion:(pro/express) ng ai r55p

Trust: 0.8

vendor:check pointmodel:vpn-1 power/utmscope:eqversion:(pro/express) ng ai r55w

Trust: 0.8

vendor:check pointmodel:vpn-1 power/utmscope:eqversion:(pro/express) ngx r60

Trust: 0.8

vendor:check pointmodel:vpn-1 power/utmscope:eqversion:(pro/express) ngx r61

Trust: 0.8

vendor:check pointmodel:vpn-1 power/utmscope:eqversion:(pro/express) ngx r62

Trust: 0.8

vendor:check pointmodel:vpn-1 power/utmscope:eqversion:(pro/express) ngx r65

Trust: 0.8

vendor:checkmodel:point software web intelligence goldscope: - version: -

Trust: 0.3

sources: CERT/CC: VU#739224 // BID: 86147 // JVNDB: JVNDB-2007-001193 // CNNVD: CNNVD-200705-309 // NVD: CVE-2007-2689

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-2689
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#739224
value: 1.76

Trust: 0.8

NVD: CVE-2007-2689
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200705-309
value: HIGH

Trust: 0.6

VULHUB: VHN-26051
value: HIGH

Trust: 0.1

VULMON: CVE-2007-2689
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-2689
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-26051
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#739224 // VULHUB: VHN-26051 // VULMON: CVE-2007-2689 // JVNDB: JVNDB-2007-001193 // CNNVD: CNNVD-200705-309 // NVD: CVE-2007-2689

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-2689

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200705-309

TYPE

unknown

Trust: 0.6

sources: CNNVD: CNNVD-200705-309

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001193

PATCH

title:sk32714url:https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk32714

Trust: 0.8

sources: JVNDB: JVNDB-2007-001193

EXTERNAL IDS

db:CERT/CCid:VU#739224

Trust: 4.0

db:NVDid:CVE-2007-2689

Trust: 2.9

db:SECTRACKid:1018067

Trust: 2.8

db:SECUNIAid:27455

Trust: 1.0

db:SECUNIAid:25285

Trust: 1.0

db:SECUNIAid:26692

Trust: 0.9

db:SECUNIAid:25302

Trust: 0.8

db:JVNDBid:JVNDB-2007-001193

Trust: 0.8

db:BUGTRAQid:20070515 GS07-01 FULL-WIDTH AND HALF-WIDTH UNICODE ENCODING IDS/IPS/WAF BYPASS VULNERABILITY

Trust: 0.6

db:CNNVDid:CNNVD-200705-309

Trust: 0.6

db:BIDid:86147

Trust: 0.4

db:VULHUBid:VHN-26051

Trust: 0.1

db:VULMONid:CVE-2007-2689

Trust: 0.1

db:PACKETSTORMid:59116

Trust: 0.1

db:PACKETSTORMid:56796

Trust: 0.1

db:PACKETSTORMid:60653

Trust: 0.1

db:PACKETSTORMid:56741

Trust: 0.1

sources: CERT/CC: VU#739224 // VULHUB: VHN-26051 // VULMON: CVE-2007-2689 // BID: 86147 // JVNDB: JVNDB-2007-001193 // PACKETSTORM: 59116 // PACKETSTORM: 56796 // PACKETSTORM: 60653 // PACKETSTORM: 56741 // CNNVD: CNNVD-200705-309 // NVD: CVE-2007-2689

REFERENCES

url:http://www.gamasec.net/english/gs07-01.html

Trust: 3.2

url:http://www.kb.cert.org/vuls/id/739224

Trust: 3.2

url:http://www.securitytracker.com/id?1018067

Trust: 2.9

url:http://www.securityfocus.com/archive/1/468633/100/0/threaded

Trust: 1.2

url:http://www.unicode.org/charts/pdf/uff00.pdf

Trust: 0.9

url:http://secunia.com/advisories/25285/

Trust: 0.9

url:http://www.cisco.com/warp/public/707/cisco-sr-20070514-unicode.shtml

Trust: 0.9

url:https://secure-support.novell.com/kanisaplatform/publishing/539/3193302_f.sal_public.html

Trust: 0.9

url:http://secunia.com/advisories/26692/

Trust: 0.9

url:http://secunia.com/advisories/27455/

Trust: 0.9

url:http://www.securityfocus.com/archive/1/archive/1/468633/100/0/threaded

Trust: 0.9

url:http://secunia.com/advisories/25302/

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/1817

Trust: 0.8

url:http://www.securityfocus.com/infocus/1232

Trust: 0.8

url:http://xforce.iss.net/xforce/alerts/id/advise68

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2689

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-2689

Trust: 0.8

url:http://secunia.com/secunia_security_advisories/

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.3

url:http://secunia.com/about_secunia_advisories/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/1423/

Trust: 0.1

url:http://unicode.org

Trust: 0.1

url:https://www.gamasec.net)

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:https://my.stonesoft.com/download.do

Trust: 0.1

url:http://secunia.com/product/16421/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/product/5600/

Trust: 0.1

url:http://secunia.com/product/722/

Trust: 0.1

url:http://secunia.com/product/721/

Trust: 0.1

sources: CERT/CC: VU#739224 // VULHUB: VHN-26051 // VULMON: CVE-2007-2689 // BID: 86147 // JVNDB: JVNDB-2007-001193 // PACKETSTORM: 59116 // PACKETSTORM: 56796 // PACKETSTORM: 60653 // PACKETSTORM: 56741 // CNNVD: CNNVD-200705-309 // NVD: CVE-2007-2689

CREDITS

Unknown

Trust: 0.3

sources: BID: 86147

SOURCES

db:CERT/CCid:VU#739224
db:VULHUBid:VHN-26051
db:VULMONid:CVE-2007-2689
db:BIDid:86147
db:JVNDBid:JVNDB-2007-001193
db:PACKETSTORMid:59116
db:PACKETSTORMid:56796
db:PACKETSTORMid:60653
db:PACKETSTORMid:56741
db:CNNVDid:CNNVD-200705-309
db:NVDid:CVE-2007-2689

LAST UPDATE DATE

2025-04-10T23:07:32.726000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#739224date:2009-04-22T00:00:00
db:VULHUBid:VHN-26051date:2018-10-16T00:00:00
db:VULMONid:CVE-2007-2689date:2018-10-16T00:00:00
db:BIDid:86147date:2007-05-15T00:00:00
db:JVNDBid:JVNDB-2007-001193date:2009-03-02T00:00:00
db:CNNVDid:CNNVD-200705-309date:2007-06-14T00:00:00
db:NVDid:CVE-2007-2689date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#739224date:2007-05-14T00:00:00
db:VULHUBid:VHN-26051date:2007-05-16T00:00:00
db:VULMONid:CVE-2007-2689date:2007-05-16T00:00:00
db:BIDid:86147date:2007-05-15T00:00:00
db:JVNDBid:JVNDB-2007-001193date:2009-03-02T00:00:00
db:PACKETSTORMid:59116date:2007-09-07T06:01:27
db:PACKETSTORMid:56796date:2007-05-17T00:35:37
db:PACKETSTORMid:60653date:2007-11-03T02:36:00
db:PACKETSTORMid:56741date:2007-05-16T01:04:41
db:CNNVDid:CNNVD-200705-309date:2007-05-15T00:00:00
db:NVDid:CVE-2007-2689date:2007-05-16T01:19:00