{ "id": "CVE-2007-2688", "sourceIdentifier": "cve@mitre.org", "published": "2007-05-16T01:19:00.000", "lastModified": "2018-10-30T16:26:16.857", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "The Cisco Intrusion Prevention System (IPS) and IOS with Firewall/IPS Feature Set do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic." }, { "lang": "es", "value": "El Sistema de Prevenci\u00f3n de Intrusiones (Intrusion Prevention System o IPS) de Cisco e IOS con el juego de funcionalidades Firewall/IPS no maneja adecuadamente determinadas codificaciones de caracteres Unicode de ancho completo y medio, lo cual podr\u00eda permitir a atacantes remotos evadir la detecci\u00f3n de tr\u00e1fico HTTP." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:ips_sensor_software:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B82862D-C006-4846-987B-F8FB113DF984" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:ips_sensor_software:5.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C36B2596-ECC6-47B6-9BB6-95F903281EFC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:ips_sensor_software:5.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "225CF995-082E-47CD-8673-F8F9832DA6E2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:ips_sensor_software:5.0\\(6\\)p1:*:*:*:*:*:*:*", "matchCriteriaId": "2AEC4E54-69C0-4115-8F57-6B25694BA07D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0EC9FE98-33D1-4072-A9AE-91E014227599" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "EBC14025-7D62-4264-A898-5085E0227F79" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "44C6A1AB-7598-4477-AB3D-4648813855FB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "E703CAFC-2ED8-4B71-8559-593BF46EE568" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "DE533A9E-2868-4C66-8ADD-D1785FFD4726" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:ips_sensor_software:5.1\\(1e\\):*:*:*:*:*:*:*", "matchCriteriaId": "34E4B9CD-D564-4FB4-BE61-B5E61E8847D7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:cisco:ips_sensor_software:5.1\\(p1\\):*:*:*:*:*:*:*", "matchCriteriaId": "344A1DD4-8A6B-46CF-B334-CE809932C7F4" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "79528F96-FD42-4A76-82EE-4B1324D53B5F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:11.1cc:*:*:*:*:*:*:*", "matchCriteriaId": "D5F31EAA-F76F-4182-B90D-6997E52EEB25" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", "matchCriteriaId": "2C398460-3F38-4AA7-A4B1-FD8A01588DB5" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*", "matchCriteriaId": "DBEA01D2-B985-4575-AF00-144CE2E3024D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*", "matchCriteriaId": "CA7F94E8-86FC-456B-A7BB-57953F67F754" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", "matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*", "matchCriteriaId": "7126E176-D739-4102-8F10-1EEB8C6A219D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*", "matchCriteriaId": "752C3C6B-910D-4153-A162-DF255F60306B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178" }, { "vulnerable": true, "criteria": "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*", "matchCriteriaId": "84900BB3-B49F-448A-9E04-FE423FBCCC4F" } ] } ] } ], "references": [ { "url": "http://www.cisco.com/en/US/products/products_security_response09186a008083f82e.html", "source": "cve@mitre.org" }, { "url": "http://www.gamasec.net/english/gs07-01.html", "source": "cve@mitre.org" }, { "url": "http://www.kb.cert.org/vuls/id/739224", "source": "cve@mitre.org", "tags": [ "US Government Resource" ] }, { "url": "http://www.securityfocus.com/archive/1/468633/100/0/threaded", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/23980", "source": "cve@mitre.org" }, { "url": "http://www.securitytracker.com/id?1018053", "source": "cve@mitre.org" }, { "url": "http://www.securitytracker.com/id?1018054", "source": "cve@mitre.org" }, { "url": "http://www.vupen.com/english/advisories/2007/1803", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34277", "source": "cve@mitre.org" }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5465", "source": "cve@mitre.org" } ] }