TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
1026
Signature ID: 36406
NetSurf Web Browser 1.2 HTML Image Tag, alt property overflow vulnerability
Threat Level: Severe
Bugtraq: 33279
Signature Description: NetSurf is a web browser for RISC and UNIX-like operating systems. NetSurf is exposed to
multiple memory corruption issues. Successful exploits allow remote attackers to execute arbitrary code in the context
of the affected application. Failed exploit attempts will likely crash the application. NetSurf version 1.2 is affected.
Attacker can exploit this by sending the html img tag with a long string in the "alt" property. This hits when the http
response consists of img tag with a long value i.e more than 150 characters in the "alt" property.
Signature ID: 36407
SeaMonkey Browser Exploitation with More Number of HTML Marquee Tags
Threat Level: Severe
Signature Description: HTML Marquee tag is used to display the scrolling text on the browser page. In the background
browser will execute the marquee function. The Remote attacker may try to crash the browser by sending more number
of marqee tags in the http response. SeaMonkey is a webbrowser. The Previous Versions of SeaMonkey 1.1.14 are
vulenerable to this attack. This rule hits when more than 60 marqee tags found in the http response page. Patches and
new versions with fixes are available at the vendors site.
Signature ID: 36409
Destiny Media Player 1.61 .lst File Local Buffer overflow
Threat Level: Severe
Bugtraq: 33100
Signature Description: LST File is a normal flat file. This file format is used to represent the list of items. This file can
be in ascii text format, or in binary format. This file may be used to export spreadsheets, database programs or may
include the list of files to be installed by the installer programs. The vulnerability exists in the parsing of the list of
items or filenames. attacker may keep a long filename or item name in the LST File to cause denial of service. Destiny
Media Player 1.61 is vulnerable to the attack. This rule hits when LST File Accessed from the internal client and the
response from the External server has long filenames.
Signature ID: 36411
Audacity 1.6.2 .gro File Local Buffer Overflow vulnerability
Threat Level: Severe
Industry ID: CVE-2009-0490
Bugtraq: 33090
Signature Description: GRO File is audio/ movie File Format, used in the applications like audacity. GRO File consists
of a list of items. The length of the each entry in the GRO File not exceeds 256 characters in general. The Vulnerability
exists in the audacity 1.6.2, cannot handle the entries having more than 256 characters for each entry. Attacker can send
a long string as an entry in the GRO File.This rule hits when the internal client accessed the remote GRO file, and the
response has large strings that is more than 256 characters.
Signature ID: 36413
Audacity 1.6.2 .aup file Buffer Overflow
Threat Level: Severe
Bugtraq: 33160
Signature Description: Audacity is an audio-editing application available for multiple platforms. AUP is a audacity
project file type, is used to save the project work to save. Only audacity software can be used to open AUP files. An
AUP file consists of smaller pieces of path information like project file name. Audacity is exposed to a buffer overflow
issue because it fails to perform adequate boundary checks on user-supplied data. This issue occurs when the