ID

VAR-200711-0394


CVE

CVE-2007-5793


TITLE

HTTP content scanning systems full-width/half-width Unicode encoding bypass

Trust: 0.8

sources: CERT/CC: VU#739224

DESCRIPTION

Stonesoft StoneGate IPS before 4.0 does not properly decode Fullwidth/Halfwidth Unicode encoded data, which makes it easier for remote attackers to scan or penetrate systems and avoid detection. This may allow malicious HTTP traffic to bypass content scanning systems. Attackers may send this type of HTTP data to evade detection and perform further attacks. Cisco has stated that all IOS releases that support the Firewall/IPS feature set are affected. Although we currently have no definitive list of such versions, Symantec is investigating the matter and will update this BID's list of vulnerable systems appropriately. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Novell iChain HTTP Unicode Encoding Detection Bypass SECUNIA ADVISORY ID: SA26692 VERIFY ADVISORY: http://secunia.com/advisories/26692/ CRITICAL: Less critical IMPACT: Security Bypass WHERE: >From remote SOFTWARE: Novell iChain 2.x http://secunia.com/product/1423/ DESCRIPTION: A vulnerability has been reported in Novell iChain, which can be exploited by malicious people to bypass certain security restrictions. SOLUTION: Apply iChain 2.3 SP5 Interim Release 3 or greater (2.3.408). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: https://secure-support.novell.com/KanisaPlatform/Publishing/539/3193302_f.SAL_Public.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Full-width and half-width is an encoding technique for Unicode characters. Some Open Source or Microsoft Products such as Microsoft ISS and .NET Framework properly decode this type of encoding. Risk Level : High Impact : Security Bypass Systems Affected : Checkpoint Web Intelligence (Confirmed) IBM ISS Proventia Series (Confirmed) Full List of Vendors : (CERT - Vulnerability Note VU#739224) [1] Remedy : Contact your vendor for a hotfix, patch or advanced configuration. Credits : Fatih Ozavci (GamaTEAM Member) Caglar Cakici (GamaTEAM Member) It's detected using GamaSEC Exploit Framework GamaSEC Information Security Audit and Consulting Services (www.gamasec.net) Original Advisory Link : http://www.gamasec.net/english/gs07-01.html References : 1. CERT - Vulnerability Note VU#739224 http://www.kb.cert.org/vuls/id/739224 2. Unicode Home Page http://unicode.org 3. Unicode.org, Halfwidth and Fullwidth Forms http://www.unicode.org/charts/PDF/UFF00.pdf -- Best Regards Fatih Ozavci IT Security Consultant . ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. The vulnerability is reported in versions prior to 4.0. SOLUTION: Update to version 4.0 or later. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. Join the FREE BETA test of the Network Software Inspector (NSI)! http://secunia.com/network_software_inspector/ The NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications

Trust: 2.97

sources: NVD: CVE-2007-5793 // CERT/CC: VU#739224 // JVNDB: JVNDB-2007-006289 // BID: 23980 // PACKETSTORM: 59116 // PACKETSTORM: 56796 // PACKETSTORM: 60653 // PACKETSTORM: 56741

AFFECTED PRODUCTS

vendor:ciscomodel:ios 12.3scope: - version: -

Trust: 8.7

vendor:ciscomodel:ios 12.3 tscope: - version: -

Trust: 4.2

vendor:ciscomodel:ios 12.4scope: - version: -

Trust: 2.1

vendor:ciscomodel:ios 12.3 t8scope: - version: -

Trust: 1.8

vendor:ciscomodel:ios 12.4 tscope: - version: -

Trust: 1.5

vendor:ciscomodel:ios 12.3 t4scope: - version: -

Trust: 1.5

vendor:ciscomodel:intrusion prevention system 5.1scope: - version: -

Trust: 1.5

vendor:ciscomodel:ios 12.3 jascope: - version: -

Trust: 1.2

vendor:ciscomodel:ios 12.3 t2scope: - version: -

Trust: 1.2

vendor:stonesoftmodel:stonegate ipsscope:lteversion:2.0

Trust: 1.0

vendor:ciscomodel:ios 12.4 t2scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.3 t9scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.3 t10scope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 12.3 ja1scope: - version: -

Trust: 0.9

vendor:3commodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:internet securitymodel: - scope: - version: -

Trust: 0.8

vendor:mcafeemodel: - scope: - version: -

Trust: 0.8

vendor:novellmodel: - scope: - version: -

Trust: 0.8

vendor:secure computing network security divisionmodel: - scope: - version: -

Trust: 0.8

vendor:stonesoftmodel: - scope: - version: -

Trust: 0.8

vendor:tippingpointmodel: - scope: - version: -

Trust: 0.8

vendor:stonesoftmodel:stonegate ipsscope:ltversion:4.0

Trust: 0.8

vendor:ciscomodel:ios 12.4 t1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.4 mrscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 bcscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 yg5scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 yfscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 t7scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 t11scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 jkscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 xe4scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 t3scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios 12.3 t5scope: - version: -

Trust: 0.6

vendor:ciscomodel:intrusion prevention system 5.0scope: - version: -

Trust: 0.6

vendor:stonesoftmodel:stonegate ipsscope:eqversion:2.0

Trust: 0.6

vendor:tippingpointmodel:zphascope:eqversion:0

Trust: 0.3

vendor:tippingpointmodel: - scope:eqversion:x5060

Trust: 0.3

vendor:tippingpointmodel: - scope:eqversion:x5050

Trust: 0.3

vendor:tippingpointmodel:smsscope:eqversion:0

Trust: 0.3

vendor:tippingpointmodel:600escope:eqversion:0

Trust: 0.3

vendor:tippingpointmodel:5000escope:eqversion:0

Trust: 0.3

vendor:tippingpointmodel: - scope:eqversion:500

Trust: 0.3

vendor:tippingpointmodel:2400escope:eqversion:0

Trust: 0.3

vendor:tippingpointmodel:200escope:eqversion:0

Trust: 0.3

vendor:tippingpointmodel: - scope:eqversion:2000

Trust: 0.3

vendor:tippingpointmodel:1200escope:eqversion:0

Trust: 0.3

vendor:stonesoftmodel:stonegate ips sensor and analyzerscope:eqversion:2.0.2

Trust: 0.3

vendor:stonesoftmodel:stonegate ips sensor and analyzerscope:eqversion:2.0.1

Trust: 0.3

vendor:stonesoftmodel:stonegate ips sensor and analyzerscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.2

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.4.3

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0.1.4

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.8)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.7)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.19)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.17)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2.(2.16)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.15)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.14)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(2.10)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.2(1)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.49)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1.(2.48)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2.5)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.1(2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(5.2)

Trust: 0.3

vendor:ciscomodel:pix/asascope:eqversion:7.0(5)

Trust: 0.3

vendor:ciscomodel:pix series security appliancescope:eqversion:5007.1

Trust: 0.3

vendor:ciscomodel:pix series security appliancescope:eqversion:5007.0

Trust: 0.3

vendor:ciscomodel:ios -7-ja2scope:eqversion:12.3

Trust: 0.3

vendor:ciscomodel:ios 12.4xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4swscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4mrscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4(8)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4(7)

Trust: 0.3

vendor:ciscomodel:ios 12.4 t6scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4(5)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4(3)

Trust: 0.3

vendor:ciscomodel:ios 12.4 xb2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 t3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.4 mr1scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4(12)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4(1)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.4

Trust: 0.3

vendor:ciscomodel:ios 12.3yzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ywscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ynscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ymscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ylscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xyscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3xx

Trust: 0.3

vendor:ciscomodel:ios 12.3xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3xv

Trust: 0.3

vendor:ciscomodel:ios 12.3xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tpcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jebscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jeascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3jascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 bc7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 bc6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 bc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(9)

Trust: 0.3

vendor:ciscomodel:ios 12.3 yi3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yi1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yg3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yg2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yg1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ygscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ya1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xy6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xy5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xy4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xu2scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(7.7)

Trust: 0.3

vendor:ciscomodel:ios 12.3 xr6scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xr4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xr3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xi9scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xi8ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xi7scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xi4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xi3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t12scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 jxscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(6)

Trust: 0.3

vendor:ciscomodel:ios 12.3 b5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 b2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 b1scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(5)

Trust: 0.3

vendor:ciscomodel:ios 12.3 xq1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xk4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xk3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xk1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xg5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xg4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xg2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xg1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xd2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xd1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 tpc11ascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t13scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 eo1scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(21)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(20)

Trust: 0.3

vendor:ciscomodel:ios 12.3 xe3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xc4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xc3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xc2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xc1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xa5scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xa4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 jlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 jk1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ja5scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(18)

Trust: 0.3

vendor:ciscomodel:ios 12.3 bc3scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(16)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(15)

Trust: 0.3

vendor:ciscomodel:ios 12.3 yx2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yu1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yt1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ytscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yq8scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yq4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yq3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yq1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ym8scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ym4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 bc1scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(13)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(12)

Trust: 0.3

vendor:ciscomodel:ios 12.3 yz1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ywscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ys1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ysscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ynscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ylscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yk2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yk1scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 ykscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yf4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yf3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 yf2scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xl3scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.3 t6scope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(11)

Trust: 0.3

vendor:ciscomodel:ios 12.3 ascope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3(10)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.3

Trust: 0.3

vendor:ciscomodel:intrustion prevention software 5.1scope: - version: -

Trust: 0.3

vendor:ciscomodel:intrusion prevention systemscope:eqversion:5.0(3)

Trust: 0.3

vendor:ciscomodel:intrusion prevention systemscope:eqversion:5.0(2)

Trust: 0.3

vendor:ciscomodel:intrusion prevention systemscope:eqversion:5.0(1)

Trust: 0.3

vendor:ciscomodel:intrusion prevention systemscope:eqversion:5.1(2)

Trust: 0.3

vendor:ciscomodel:intrusion prevention systemscope:eqversion:5.1(1)

Trust: 0.3

vendor:ciscomodel:intrusion prevention systemscope:eqversion:4.x

Trust: 0.3

vendor:stonesoftmodel:stonegate ipsscope:neversion:4.1

Trust: 0.3

vendor:stonesoftmodel:stonegate ipsscope:neversion:4.0

Trust: 0.3

sources: CERT/CC: VU#739224 // BID: 23980 // JVNDB: JVNDB-2007-006289 // CNNVD: CNNVD-200711-016 // NVD: CVE-2007-5793

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-5793
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#739224
value: 1.76

Trust: 0.8

NVD: CVE-2007-5793
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200711-016
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2007-5793
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: CERT/CC: VU#739224 // JVNDB: JVNDB-2007-006289 // CNNVD: CNNVD-200711-016 // NVD: CVE-2007-5793

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-DesignError

Trust: 0.8

sources: JVNDB: JVNDB-2007-006289 // NVD: CVE-2007-5793

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200711-016

TYPE

Design Error

Trust: 0.9

sources: BID: 23980 // CNNVD: CNNVD-200711-016

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-006289

PATCH

title:StoneGate IPSurl:http://www.stonesoft.com/en/products/ips/Software_Solutions/

Trust: 0.8

sources: JVNDB: JVNDB-2007-006289

EXTERNAL IDS

db:CERT/CCid:VU#739224

Trust: 3.8

db:NVDid:CVE-2007-5793

Trust: 2.7

db:SECUNIAid:27455

Trust: 2.6

db:OSVDBid:40627

Trust: 1.6

db:VUPENid:ADV-2007-2757

Trust: 1.6

db:SECUNIAid:25285

Trust: 1.0

db:SECUNIAid:26692

Trust: 0.9

db:SECUNIAid:25302

Trust: 0.8

db:JVNDBid:JVNDB-2007-006289

Trust: 0.8

db:CNNVDid:CNNVD-200711-016

Trust: 0.6

db:BIDid:23980

Trust: 0.3

db:PACKETSTORMid:59116

Trust: 0.1

db:PACKETSTORMid:56796

Trust: 0.1

db:PACKETSTORMid:60653

Trust: 0.1

db:PACKETSTORMid:56741

Trust: 0.1

sources: CERT/CC: VU#739224 // BID: 23980 // JVNDB: JVNDB-2007-006289 // PACKETSTORM: 59116 // PACKETSTORM: 56796 // PACKETSTORM: 60653 // PACKETSTORM: 56741 // CNNVD: CNNVD-200711-016 // NVD: CVE-2007-5793

REFERENCES

url:http://www.kb.cert.org/vuls/id/739224

Trust: 3.0

url:http://www.kb.cert.org/vuls/id/mimg-72brkj

Trust: 1.6

url:http://osvdb.org/40627

Trust: 1.6

url:http://secunia.com/advisories/27455

Trust: 1.6

url:http://www.gamasec.net/english/gs07-01.html

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/2757

Trust: 1.0

url:http://www.unicode.org/charts/pdf/uff00.pdf

Trust: 0.9

url:http://secunia.com/advisories/25285/

Trust: 0.9

url:http://www.cisco.com/warp/public/707/cisco-sr-20070514-unicode.shtml

Trust: 0.9

url:https://secure-support.novell.com/kanisaplatform/publishing/539/3193302_f.sal_public.html

Trust: 0.9

url:http://secunia.com/advisories/26692/

Trust: 0.9

url:http://secunia.com/advisories/27455/

Trust: 0.9

url:http://secunia.com/advisories/25302/

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/1817

Trust: 0.8

url:http://www.securityfocus.com/infocus/1232

Trust: 0.8

url:http://xforce.iss.net/xforce/alerts/id/advise68

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5793

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-5793

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/2757

Trust: 0.6

url:http://www.cisco.com/en/us/products/sw/secursw/ps2113/

Trust: 0.3

url:http://www.cisco.com/en/us/products/products_security_response09186a008083f82e.html#response

Trust: 0.3

url:/archive/1/468633

Trust: 0.3

url:http://www.3com.com/securityalert/alerts/3com-07-001.html

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.3

url:http://secunia.com/about_secunia_advisories/

Trust: 0.3

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/1423/

Trust: 0.1

url:http://unicode.org

Trust: 0.1

url:https://www.gamasec.net)

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:https://my.stonesoft.com/download.do

Trust: 0.1

url:http://secunia.com/product/16421/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/product/5600/

Trust: 0.1

url:http://secunia.com/product/722/

Trust: 0.1

url:http://secunia.com/product/721/

Trust: 0.1

sources: CERT/CC: VU#739224 // BID: 23980 // JVNDB: JVNDB-2007-006289 // PACKETSTORM: 59116 // PACKETSTORM: 56796 // PACKETSTORM: 60653 // PACKETSTORM: 56741 // CNNVD: CNNVD-200711-016 // NVD: CVE-2007-5793

CREDITS

Fatih OzavciCaglar Cakici

Trust: 0.6

sources: CNNVD: CNNVD-200711-016

SOURCES

db:CERT/CCid:VU#739224
db:BIDid:23980
db:JVNDBid:JVNDB-2007-006289
db:PACKETSTORMid:59116
db:PACKETSTORMid:56796
db:PACKETSTORMid:60653
db:PACKETSTORMid:56741
db:CNNVDid:CNNVD-200711-016
db:NVDid:CVE-2007-5793

LAST UPDATE DATE

2025-04-10T23:07:32.629000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#739224date:2009-04-22T00:00:00
db:BIDid:23980date:2016-07-05T22:20:00
db:JVNDBid:JVNDB-2007-006289date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200711-016date:2007-11-05T00:00:00
db:NVDid:CVE-2007-5793date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:CERT/CCid:VU#739224date:2007-05-14T00:00:00
db:BIDid:23980date:2007-05-14T00:00:00
db:JVNDBid:JVNDB-2007-006289date:2012-12-20T00:00:00
db:PACKETSTORMid:59116date:2007-09-07T06:01:27
db:PACKETSTORMid:56796date:2007-05-17T00:35:37
db:PACKETSTORMid:60653date:2007-11-03T02:36:00
db:PACKETSTORMid:56741date:2007-05-16T01:04:41
db:CNNVDid:CNNVD-200711-016date:2007-05-14T00:00:00
db:NVDid:CVE-2007-5793date:2007-11-01T17:46:00