TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
1031
Signature ID: 36430
PowerPoint Viewer OCX Activex Vulnerability
Threat Level: Severe
Bugtraq: 33238
Signature Description: PowerPoint Viewer OCX acts as an ActiveX document container for hosting PowerPoint
documents in a custom form or Web page. The OCX is lightweight and flexible, and gives developers new possibilities
for using Microsoft PowerPoint in a custom solution. The remote attacker can exploit this issue by enticing the users to
visit malicious web pages. The successful remote attacker can execute arbitrary code in the context of the application
using the vulnerable activex. No Remedy available. User can set killbit to the clsid corresponding to the progid
PowerPoint.Show to resolve this issue.
Signature ID: 36431
PowerPoint Viewer OCX Activex Vulnerability
Threat Level: Severe
Bugtraq: 33238
Signature Description: PowerPoint Viewer OCX acts as an ActiveX document container for hosting PowerPoint
documents in a custom form or Web page. The OCX is lightweight and flexible, and gives developers new possibilities
for using Microsoft PowerPoint in a custom solution. The remote attacker can exploit this issue by enticing the users to
visit malicious web pages. The successful remote attacker can execute arbitrary code in the context of the application
using the vulnerable activex. No Remedy available. User can set the killbit to the vulnerable activex.
Signature ID: 37000
Classical SQL Injection with a tautology condition with Integers and Comments
Threat Level: Severe
Signature Description: SQL injection is a type of security exploit in which the attacker adds Structured Query
Language (SQL) code to a Web form input box to gain access to resources or make changes to data. An SQL query is a
request for some action to be performed on a database. Typically, on a Web form for user authentication, when a user
enters their name and password into the text boxes provided for them, those values are inserted into a SELECT query.
If the values entered are found as expected, the user is allowed access; if they aren't found, access is denied. However,
most Web forms have no mechanisms in place to block input other than names and passwords. Unless such precautions
are taken, an attacker can use the input boxes to send their own request to the database, which could allow them to
download the entire database or interact with it in other illegal ways. This rule hits when any request or post data
argument consists the pattern ' or 1=1 -- kind of pattern. SQL query execution always returns true. By this query an
attacker can bypass logins or authentications. Successful attacker may gains the access to the admin page of the
affected web-server.
Signature ID: 37001
Classical SQL Injection with a tautology condition and with Integers
Threat Level: Severe
Signature Description: SQL injection is a type of security exploit in which the attacker adds Structured Query
Language (SQL) code to a Web form input box to gain access to resources or make changes to data. An SQL query is a
request for some action to be performed on a database. Typically, on a Web form for user authentication, when a user
enters their name and password into the text boxes provided for them, those values are inserted into a SELECT query.
If the values entered are found as expected, the user is allowed access; if they aren't found, access is denied. However,
most Web forms have no mechanisms in place to block input other than names and passwords. Unless such precautions
are taken, an attacker can use the input boxes to send their own request to the database, which could allow them to
download the entire database or interact with it in other illegal ways. This rule hits when any request or post data
argument consists the pattern ' or 1=1. This sql query execution always returns true. By this query an attacker can
bypass logins or authentications. Successful attacker may gains the access to the admin page of the affected web-server.