CVE-2006-4911

Unspecified vulnerability in Cisco IPS 5.0 before 5.0(6p2) and 5.1 before 5.1(2), when running in inline or promiscuous mode, allows remote attackers to bypass traffic inspection via a "crafted sequence of fragmented IP packets".
References
Link Resource
http://secunia.com/advisories/22022 Third Party Advisory
http://securitytracker.com/id?1016891 Third Party Advisory VDB Entry
http://www.cisco.com/warp/public/707/cisco-sa-20060920-ips.shtml Vendor Advisory
http://www.kb.cert.org/vuls/id/658884 Third Party Advisory US Government Resource
http://www.osvdb.org/29036 Broken Link
http://www.securityfocus.com/bid/20127 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2006/3721 Permissions Required
https://exchange.xforce.ibmcloud.com/vulnerabilities/29058 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:ips_sensor_software:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:ips_sensor_software:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2006-09-21 00:07

Updated : 2023-12-10 10:40


NVD link : CVE-2006-4911

Mitre link : CVE-2006-4911

CVE.ORG link : CVE-2006-4911


JSON object : View

Products Affected

cisco

  • ips_sensor_software