First published: Fri Oct 12 2001(Updated: )
Various Intrusion Detection Systems (IDS) including (1) Cisco Secure Intrusion Detection System, (2) Cisco Catalyst 6000 Intrusion Detection System Module, (3) Dragon Sensor 4.x, (4) Snort before 1.8.1, (5) ISS RealSecure Network Sensor 5.x and 6.x before XPU 3.2, and (6) ISS RealSecure Server Sensor 5.5 and 6.0 for Windows, allow remote attackers to evade detection of HTTP attacks via non-standard "%u" Unicode encoding of ASCII characters in the requested URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ISS RealSecure | =5.5 | |
ISS RealSecure | =6.x | |
ISS RealSecure | =6.0 | |
Cisco Catalyst 6000 Intrusion Detection System Module | ||
Snort | =1.8.1 | |
ISS RealSecure | =5.x | |
Cisco Secure Intrusion Detection System | ||
Enterasys Dragon | =4.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0669 is considered a significant security vulnerability due to its impact on various Intrusion Detection Systems.
To fix CVE-2001-0669, ensure that your Intrusion Detection Systems are updated to the latest versions recommended by the vendor.
CVE-2001-0669 affects several intrusion detection systems, including Cisco Secure IDS, Snort versions prior to 1.8.1, and ISS RealSecure among others.
CVE-2001-0669 allows for potential bypass of detection and possible intrusion into networks utilizing vulnerable IDS systems.
Yes, CVE-2001-0669 has known exploits that can leverage the vulnerability to evade detection mechanisms in affected IDS.