First published: Thu Sep 21 2006(Updated: )
Unspecified vulnerability in Cisco IPS 5.0 before 5.0(6p2) and 5.1 before 5.1(2), when running in inline or promiscuous mode, allows remote attackers to bypass traffic inspection via a "crafted sequence of fragmented IP packets".
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IPS Sensor Software | >=5.0<5.0\(6p2\) | |
Cisco IPS Sensor Software | >=5.1<5.1\(2\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4911 has a critical severity rating as it allows remote attackers to bypass security controls.
To fix CVE-2006-4911, upgrade the Cisco IPS to version 5.0(6p2) or 5.1(2) or later.
CVE-2006-4911 affects Cisco IPS Sensor Software versions before 5.0(6p2) and 5.1(2).
CVE-2006-4911 enables remote attackers to bypass traffic inspection through crafted fragmented IP packets.
CVE-2006-4911 occurs when Cisco IPS is running in inline or promiscuous mode.