TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
1011
interfaces with very little code. Flexcell Grid ActiveX control 5.6.9 and 5.7.0.2 are vulnerable to arbitrary file overwrite
vulnerability. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability
using the SaveFile() and ExportToXML() insecure methods to create and overwrite arbitrary files on the system. No
remedy available as of January 28, 2009. Users are advised to set killbit to the clsid 2A7D9CCE-211A-4654-9449-
718F71ED9644 to resolve this issue.
Signature ID: 35824
Siemens SL2-141 ADSL Router Cross-Site Request Forgery Vulnerability
Threat Level: Severe
Bugtraq: 33437
Signature Description: SL2-141/SL2-141-I Wireless ADSL2 Router is a DSL broadband access device which allows
ADSL connectivity while providing 802.11g wireless LAN capabilities for home or office users. It supports
ADSL2/ADSL2+ and is backward compatible to ADSL, even offers auto-negotiation capability for different flavors.
The Siemens SL2-141 ADSL router is prone to a cross-site request-forgery vulnerability. Successful exploits can run
privileged commands on the affected devices, including enabling remote access to the web administration interface.
This may lead to further network-based attacks. No remedy is available as of 29th January 2009 to resolve this issue.
Signature ID: 35825
SmartVMD ActiveX Control Multiple Insecure Method Vulnerabilities
Threat Level: Warning
Bugtraq: 33348,33349
Signature Description: SmartVMD ActiveX is a control for Video Motion Detection developed for programmers in
Microsoft environment such as VB, INTERNET EXPLORER, ACCESS, Visual C++ and .NET. SmartVMD 1.1 is
vulnerable to arbitrary file deletion and Arbitrary File Overwrite Vulnerabilities. The vulnerabilities are caused due to
the VideoMovementDetection.MotionDetection (VideoMovementDetection.dll) ActiveX control providing the
insecure "StartVideoSaving()" and "SaveMaskToFile()" methods. This can be exploited to delete or overwrite arbitrary
files on the local system via arguments passed to the affected methods. No remedy is available as of 29th January 2009
to resolve this issue. Alternately user can Set kill-bit to the clsid to resolve this issue.
Signature ID: 35826
MetaProducts MetaTreeX ActiveX Control Insecure Methods
Threat Level: Warning
Bugtraq: 33318
Signature Description: MetaTreeX is an ActiveX control which displays hierarchical information as a graphs tree on an
elliptical parabolic surface, which allows the user to view all the selected information at once rather than drilling down
through folders. The user can modify the display by expanding and collapsing nodes, adding and deleting child nodes
and changing the display color of each node. MTXControl.OCX version 1.5.0.100 is vulnerable to file manipulation
error. The SaveToBMP.MetaTreeX ActiveX control (MTXControl.OCX) contains the insecure "SaveToBMP()" and
"SaveToFile()" methods. This can be exploited to corrupt/overwrite arbitrary files in the context of the currently
logged-on user. Set the kill-bit for the affected ActiveX control to resolve this issue.
Signature ID: 35827
Excel Viewer OCX Multiple Insecure Method Vulnerabilities
Threat Level: Warning
Bugtraq: 33222,33322,33243
Signature Description: Excel Viewer ActiveX Control allows users to interact with Microsoft Excel in Win Forms or
web page. It Support Office automating client to custom your application. Include abundant sample codes. It can be
easily integrated into applications written in languages that support ActiveX control such as Visual C++, Visual Basic,
Delphi, C++ Builder and .Net languages. Office OCX Excel Viewer OCX 3.2 is vulnerable to arbitrary file overwrite
and file manipulation vulnerabilities. The vulnerabilities are caused due to the presents of insecure Open(),