TippingPoint IPS before 20070710 does not properly handle a hex-encoded alternate Unicode '/' (slash) character, which might allow remote attackers to send certain network traffic and avoid detection, as demonstrated by a cmd.exe attack.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/24855 | vdb entry exploit |
http://secunia.com/advisories/26013 | third party advisory |
http://www.securitytracker.com/id?1018361 | vdb entry |
http://www.3com.com/securityalert/alerts/3COM-07-003.html | patch vendor advisory |
http://security-assessment.com/files/advisories/2007-07-11_Tippingpoint_IPS_Signature_Evasion.pdf | patch vendor advisory exploit |
http://lists.grok.org.uk/pipermail/full-disclosure/2007-July/064550.html | mailing list |
http://www.vupen.com/english/advisories/2007/2490 | vdb entry |
http://www.securityfocus.com/archive/1/473311/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35336 | vdb entry |
http://osvdb.org/35970 | vdb entry |