Unspecified vulnerability in Cisco IPS 5.0 before 5.0(6p2) and 5.1 before 5.1(2), when running in inline or promiscuous mode, allows remote attackers to bypass traffic inspection via a "crafted sequence of fragmented IP packets".
References
Link | Resource |
---|---|
http://www.cisco.com/warp/public/707/cisco-sa-20060920-ips.shtml | Vendor Advisory |
http://www.kb.cert.org/vuls/id/658884 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/20127 | Third Party Advisory VDB Entry |
http://securitytracker.com/id?1016891 | Third Party Advisory VDB Entry |
http://secunia.com/advisories/22022 | Third Party Advisory |
http://www.osvdb.org/29036 | Broken Link |
http://www.vupen.com/english/advisories/2006/3721 | Permissions Required |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29058 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2006-09-20 17:07
Updated : 2019-07-31 05:55
NVD link : CVE-2006-4911
Mitre link : CVE-2006-4911
JSON object : View
CWE
Products Affected
cisco
- ips_sensor_software