First published: Wed May 16 2007(Updated: )
The 3Com TippingPoint IPS do not properly handle certain full-width and half-width Unicode character encodings in an HTTP POST request, which might allow remote attackers to evade detection of HTTP traffic.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
3com Tippingpoint 2400e | ||
3com Tippingpoint 200e | ||
3com Tippingpoint 200 | ||
3com 3crx506-96 | ||
3com Tippingpoint 5000e | ||
3com Tippingpoint 50 | ||
3com Tippingpoint 600e | ||
3com 3crtpx505-73 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2734 has a moderate severity rating as it allows remote attackers to evade detection in HTTP traffic.
To mitigate CVE-2007-2734, ensure your 3Com TippingPoint devices are updated to the latest firmware that addresses this vulnerability.
CVE-2007-2734 affects 3Com TippingPoint models such as 2400e, 200e, 200, 5000e, 50, 600e, and specific 3Com models like 3crx506-96 and 3crtpx505-73.
Yes, CVE-2007-2734 can be exploited remotely, allowing attackers to manipulate HTTP POST requests to evade detection.
CVE-2007-2734 allows for evasion techniques in web traffic, potentially facilitating malicious activities like injection attacks by obscuring malicious payloads.