Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 179006 - net-analyzer/snort Full-Width and Half-Width Unicode Encoding IDS/IPS/WAF Bypass Vulnerability
Summary: net-analyzer/snort Full-Width and Half-Width Unicode Encoding IDS/IPS/WAF Byp...
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://www.gamasec.net/english/gs07-0...
Whiteboard: B4 [] jaervosz
Keywords:
Depends on:
Blocks:
 
Reported: 2007-05-18 14:25 UTC by Carsten Lohrke (RETIRED)
Modified: 2007-06-29 17:51 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carsten Lohrke (RETIRED) gentoo-dev 2007-05-18 14:25:59 UTC
Various HTTP content scanning systems fail to properly scan full-width/half-width Unicode encoded traffic. This may allow malicious content to bypass HTTP content scanning systems.

HTTP Content Scanning Systems have a pre-processor to decode various forms of HTTP encoded requests such as UTF encoding for attack signature analysis. Full-width and half-width is an encoding technique for Unicode characters. Various HTTP content scanning systems fail to properly scan full-width/half-width Unicode encoded traffic.

Some Open Source or Microsoft Products such as Microsoft IIS and .NET Framework properly decode this type of encoding. But most IDS/IPS/WAF products does not properly decode full-width Unicode (%uff) encoded HTTP requests for analysis, Lowercase/Uppercase conversion and character matching. By sending HTTP traffic to a vulnerable content scanning system, an attacker may be able to bypass the content scanning system. 


http://www.gamasec.net/english/gs07-01.html
Comment 1 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-05-19 22:23:26 UTC
netmon please advise.
Comment 2 Daniel Black (RETIRED) gentoo-dev 2007-05-20 03:20:16 UTC
http://www.kb.cert.org/vuls/id/739224 listed as vulnerable.
http://www.kb.cert.org/vuls/id/MIMG-72BRK3 - no reponce from vendor.
no mention of the vul in the email lists, website or release notes for 2.6.1.5.
no reponce on irc #snort (yet)

going to assume its not fixed in 2.6.1.5 until some upstream confirmation occurs
Comment 3 Markus Ullmann (RETIRED) gentoo-dev 2007-06-06 07:33:40 UTC
no news yet :(
Comment 4 Richard Scott 2007-06-26 11:59:36 UTC
This page has now been updated:

http://www.kb.cert.org/vuls/id/MIMG-72BRK3

As of 19/06/2007 stating that snort is Not Vulnerable to this.
Comment 5 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-06-29 17:51:09 UTC
Seems like it doesn't affect snort after all.