Vulnerability Name:

CVE-2007-2690 (CCN-34277)

Assigned:2007-05-14
Published:2007-05-14
Updated:2018-10-16
Summary:Multiple IBM ISS Proventia Series products, including the A, G, and M series, do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
5.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: BugTraq Mailing List, Tue May 15 2007 - 01:36:24 CDT
GS07-01 Full-Width and Half-Width Unicode Encoding IDS/IPS/WAF Bypass Vulnerability

Source: MITRE
Type: CNA
CVE-2007-2688

Source: MITRE
Type: CNA
CVE-2007-2689

Source: MITRE
Type: CNA
CVE-2007-2690

Source: MITRE
Type: CNA
CVE-2007-2734

Source: MITRE
Type: CNA
CVE-2007-3570

Source: MITRE
Type: CNA
CVE-2007-5793

Source: CCN
Type: Salesforce Web site
Imperva Security Response for VU#739224

Source: CCN
Type: SA25285
Cisco Products HTTP Unicode Encoding Detection Bypass

Source: CCN
Type: SA25302
3Com TippingPoint IPS HTTP Unicode Encoding Detection Bypass

Source: CCN
Type: SA26692
Novell iChain HTTP Unicode Encoding Detection Bypass

Source: CCN
Type: SA26695
Novell Access Manager HTTP Unicode Encoding Detection Bypass

Source: CCN
Type: SA26698
Novell BorderManager Unicode Encoding Detection Bypass

Source: CCN
Type: SA27455
Stonesoft StoneGate IPS HTTP Unicode Encoding Detection Bypass

Source: CCN
Type: SECTRACK ID: 1018053
Cisco IOS Firewall/IPS Feature Set Lets Remote Users Evade Detection With Certain Character Encodings

Source: CCN
Type: SECTRACK ID: 1018054
Cisco Intrusion Prevention System Lets Remote Users Evade Detection With Certain Character Encodings

Source: CCN
Type: SECTRACK ID: 1018067
Check Point Web Intelligence Lets Remote Users Evade Detection With Certain Character Encodings

Source: CCN
Type: SECTRACK ID: 1018068
Proventia Lets Remote Users Evade Detection With Certain Character Encodings

Source: CCN
Type: 3COM-07-001
TippingPoint™ IPS Unicode Evasion

Source: CCN
Type: cisco-sr-20070514-unicode
Cisco Security Response: HTTP Full-Width and Half-Width Unicode Encoding Evasion

Source: CCN
Type: GamaLAB Security Advisory GS07-01
Full-Width and Half-Width Unicode Encoding IDS/IPS/WAF Bypass Vulnerability

Source: MISC
Type: UNKNOWN
http://www.gamasec.net/english/gs07-01.html

Source: CCN
Type: US-CERT VU#739224
HTTP content scanning systems full-width/half-width Unicode encoding bypass

Source: CERT-VN
Type: US Government Resource
VU#739224

Source: CCN
Type: Stonesoft Information for VU#739224
Stonesoft StoneGate IPS unicode bypass

Source: CCN
Type: Novell Web site, June 28, 2007
Novell Access Manager 3.0 SP1 Release Candidate 1 Readme

Source: CCN
Type: OSVDB ID: 35336
Cisco Multiple Products HTTP Unicode Encoding Detection Bypass

Source: CCN
Type: OSVDB ID: 35968
3Com TippingPoint IPS HTTP Unicode Encoding Detection Bypass

Source: CCN
Type: OSVDB ID: 37322
Novell Multiple Security Product Unicode Encoded Traffic Detection Bypass

Source: CCN
Type: OSVDB ID: 40627
StoneGate IPS HTTP Unicode Encoded Data Remote Detection Bypass

Source: CCN
Type: OSVDB ID: 45743
Novell Access Manager Linux Access Gateway POST Request Fullwidth/Halfwidth Unicode Encoded Data Bypass

Source: CCN
Type: OSVDB ID: 56534
Check Point Web Intelligence Unicode Character Encoding Handling HTTP Traffic Detection Bypass

Source: CCN
Type: OSVDB ID: 58659
IBM ISS Proventia Multiple Products Unicode Character Encoding Handling HTTP Traffic Detection Bypass

Source: BUGTRAQ
Type: UNKNOWN
20070515 GS07-01 Full-Width and Half-Width Unicode Encoding IDS/IPS/WAF Bypass Vulnerability

Source: CCN
Type: BID-23980
Multiple Products Full/Half Width Unicode Detection Evasion Vulnerability

Source: CCN
Type: BID-25568
Multiple Novell Content Scanning Systems Full-Width/Half-Width Unicode Scan Bypass Vulnerability

Source: SECTRACK
Type: UNKNOWN
1018068

Source: CCN
Type: Stonesoft Web site
IPS Software Solutions

Source: XF
Type: UNKNOWN
multiple-scanengine-unicode-security-bypass(34277)

Source: CCN
Type: McAfee Security Bulletin 612970
IntruShield signature prevents published full/half width Unicode character obfuscation technique

Source: CCN
Type: Novell Security Alert Document ID: 3193302
Security concerns scanning full-width/half-width Unicode encoded traffic

Vulnerable Configuration:Configuration 1:
  • cpe:/h:iss:proventia_a_series_xpu:20.11:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_a_series_xpu:22.1:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_a_series_xpu:22.2:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_a_series_xpu:22.3:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_a_series_xpu:22.4:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_a_series_xpu:22.5:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_a_series_xpu:22.6:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_a_series_xpu:*:*:*:*:*:*:*:* (Version <= 22.10)
  • OR cpe:/h:iss:proventia_g_series_xpu:22.1:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_g_series_xpu:22.2:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_g_series_xpu:22.3:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_g_series_xpu:22.4:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_g_series_xpu:22.5:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_g_series_xpu:22.6:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_g_series_xpu:22.7:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_g_series_xpu:22.8:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_g_series_xpu:22.9:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_g_series_xpu:22.10:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_g_series_xpu:*:*:*:*:*:*:*:* (Version <= 22.11)
  • OR cpe:/h:iss:proventia_m_series_xpu:1.1:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_m_series_xpu:1.2:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_m_series_xpu:1.3:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_m_series_xpu:1.4:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_m_series_xpu:1.5:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_m_series_xpu:1.6:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_m_series_xpu:1.7:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_m_series_xpu:1.8:*:*:*:*:*:*:*
  • OR cpe:/h:iss:proventia_m_series_xpu:*:*:*:*:*:*:*:* (Version <= 1.9)

  • Configuration CCN 1:
  • cpe:/o:cisco:ios:12.0:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.1t:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.1e:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:11.1cc:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.0s:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.0t:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.0st:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.2t:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:11.3:*:*:*:*:*:*:*
  • OR cpe:/a:checkpoint:web_intelligence:-:*:*:*:*:*:*:*
  • OR cpe:/a:novell:bordermanager:3.8:*:*:*:*:*:*:*
  • OR cpe:/a:novell:ichain:2.3:*:*:*:*:*:*:*
  • OR cpe:/a:imperva:securesphere_mx_management_server:5.0:*:*:*:*:*:*:*
  • OR cpe:/h:3com:3crtpx505-73:-:*:*:*:*:*:*:*
  • OR cpe:/h:3com:3crx506-96:-:*:*:*:*:*:*:*
  • OR cpe:/a:novell:access_manager:3:*:*:*:*:*:*:*
  • OR cpe:/h:3com:tippingpoint_200:*:*:*:*:*:*:*:*
  • OR cpe:/h:3com:tippingpoint_200e:*:*:*:*:*:*:*:*
  • OR cpe:/h:3com:tippingpoint_2400e:*:*:*:*:*:*:*:*
  • OR cpe:/h:3com:tippingpoint_50:*:*:*:*:*:*:*:*
  • OR cpe:/h:3com:tippingpoint_5000e:*:*:*:*:*:*:*:*
  • OR cpe:/h:3com:tippingpoint_600e:*:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:10.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    iss proventia a series xpu 20.11
    iss proventia a series xpu 22.1
    iss proventia a series xpu 22.2
    iss proventia a series xpu 22.3
    iss proventia a series xpu 22.4
    iss proventia a series xpu 22.5
    iss proventia a series xpu 22.6
    iss proventia a series xpu *
    iss proventia g series xpu 22.1
    iss proventia g series xpu 22.2
    iss proventia g series xpu 22.3
    iss proventia g series xpu 22.4
    iss proventia g series xpu 22.5
    iss proventia g series xpu 22.6
    iss proventia g series xpu 22.7
    iss proventia g series xpu 22.8
    iss proventia g series xpu 22.9
    iss proventia g series xpu 22.10
    iss proventia g series xpu *
    iss proventia m series xpu 1.1
    iss proventia m series xpu 1.2
    iss proventia m series xpu 1.3
    iss proventia m series xpu 1.4
    iss proventia m series xpu 1.5
    iss proventia m series xpu 1.6
    iss proventia m series xpu 1.7
    iss proventia m series xpu 1.8
    iss proventia m series xpu *
    cisco ios 12.0
    cisco ios 12.1t
    cisco ios 12.1e
    cisco ios 11.1cc
    cisco ios 12.0s
    cisco ios 12.0t
    cisco ios 12.0st
    cisco ios 12.1
    cisco ios 12.2t
    cisco ios 12.2
    cisco ios 11.3
    checkpoint web intelligence -
    novell bordermanager 3.8
    novell ichain 2.3
    imperva securesphere mx management server 5.0
    3com 3crtpx505-73 -
    3com 3crx506-96 -
    novell access manager 3
    3com tippingpoint 200 *
    3com tippingpoint 200e *
    3com tippingpoint 2400e *
    3com tippingpoint 50 *
    3com tippingpoint 5000e *
    3com tippingpoint 600e *
    cisco ios 10.0