TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
1029
applications and report generators. Especially Office, VB and VBA developers benefit from the convenient and
powerful programming options. This activex SUPPLEMENT method suffers from the Buffer overflow attack. The
remote attacker can exploit this issue by enticing the users to visit malicious web pages. The successful remote attacker
can execute arbitrary code in the context of the application using the vulnerable activex. No Remedy available. User
can set the killbit to the vulnerable activex.User can set killbit to the clsid corresponding to the progid
BARCODELib.MW6Barcode to resolve this issue. This rule hits when http response consists of the vulnerable activex
with VBScript or JavaScript and with shell code.
Signature ID: 36422
MW6 Barcode ActiveX (Barcode.dll) Reamote Heap Overflow
Threat Level: Severe
Industry ID: CVE-2009-0298 Bugtraq: 33451
Signature Description: Barcode Activex has rich set of features to embed the Barcode representation on the Microsoft
products.This Barcode ActiveX Control can be embedded seamlessly into Microsoft Office Products like MS Access,
Excel, Word, and Development products like Visual Basic, development environments, programming languages, web
applications and report generators. Especially Office, VB and VBA developers benefit from the convenient and
powerful programming options. This activex SUPPLEMENT method suffers from the Buffer overflow attack. The
remote attacker can exploit this issue by enticing the users to visit malicious web pages. The successful remote attacker
can execute arbitrary code in the context of the application using the vulnerable activex. No Remedy available. User
can set the killbit to the vulnerable activex.User can set killbit to the clsid corresponding to the progid
BARCODELib.MW6Barcode to resolve this issue.This rule hits when http response consists of vulnerable activex with
VBScript or Javascript and with UTF encoded format.
Signature ID: 36423
MW6 Barcode ActiveX (Barcode.dll) Reamote Heap Overflow
Threat Level: Severe
Industry ID: CVE-2009-0298 Bugtraq: 33451
Signature Description: Barcode Activex has rich set of features to embed the Barcode representation on the Microsoft
products.This Barcode ActiveX Control can be embedded seamlessly into Microsoft Office Products like MS Access,
Excel, Word, and Development products like Visual Basic, development environments, programming languages, web
applications and report generators. Especially Office, VB and VBA developers benefit from the convenient and
powerful programming options. This activex SUPPLEMENT method suffers from the Buffer overflow attack. The
remote attacker can exploit this issue by enticing the users to visit malicious web pages. The successful remote attacker
can execute arbitrary code in the context of the application using the vulnerable activex. No Remedy available. User
can set the killbit to the vulnerable activex. This Rule hits when Vulenerable MW6 Barcode ProgId is with UTF
encoded format in the http response.This rule hits when the activex found with UTF encoded format in the http
response.
Signature ID: 36424
PowerPoint Viewer OCX Activex Vulnerability
Threat Level: Warning
Bugtraq: 33238
Signature Description: PowerPoint Viewer OCX acts as an ActiveX document container for hosting PowerPoint
documents in a custom form or Web page. The OCX is lightweight and flexible, and gives developers new possibilities
for using Microsoft PowerPoint in a custom solution. No Remedy available. User can set the killbit to the vulnerable
activex.This rule hits when the vulnerable activex and the method found on the http response.