TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
1045
Signature ID: 38051
RIM BlackBerry Enterprise Server Router Component Denial of Service
Threat Level: Warning
Industry ID: CVE-2005-2342
Signature Description: There exists a denial of service vulnerability in the RIM BlackBerry Server product. The
communication between BlackBerry routers may be disrupted by sending crafted Server Routing Protocol (SRP)
messages. A remote unauthenticated attacker can cause a denial of service condition of the affected BlackBerry service.
The vulnerability exists in the router component of the BlackBerry Enterprise Server which is implemented by the
binary executable BlackberryRouter.exe.
Signature ID: 38052
TWiki rev Parameter Shell Command Injection
Threat Level: Severe
Industry ID: CVE-2005-2377
Signature Description: A vulnerability exists in the TWiki product. The flaw is caused by insufficient sanitization of
user supplied parameters in HTTP requests. A successful exploit attempt of this vulnerability allows a malicious user to
execute arbitrary shell commands with the privileges of the TWiki process.
Signature ID: 38053
VERITAS NetBackup vmd Shared Library Buffer Overflow
Threat Level: Severe
Industry ID: CVE-2005-3116
Signature Description: There exists a stack-based buffer overflow vulnerability in VERITAS NetBackup Enterprise
Server. The flaw is caused by insufficient boundary checks when processing user supplied message. An unauthorized
attacker may leverage this vulnerability to inject and execute arbitrary code on the target system. The vulnerable
program is the dynamically linked library netbackup.dll. The vulnerable method, get_string, reads incoming network
data. The problematic parameter is the data size field value supplied by a remote client.
Signature ID: 38054
Microsoft Windows Media Player BMP File Handling Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2006-0006
Signature Description: Here exists a vulnerability in the BMP image processing component of Microsoft Windows
Media Player. The vulnerability exists due to the failure of the application to properly validate the value of a field in the
BMP image, leading to a buffer overflow. An attacker can exploit this vulnerability by enticing a user to open a
malicious BMP image with the affected application, causing the execution of arbitrary code in the security context of
the current user. The vulnerable library is wmp.dll on Windows Media Player 9 and 10 and wmpui.dll on Windows
Media Player 7.1 and 8. The vulnerable function processes BMP files. The vulnerable parameter is the DataOffset
value in the BMP file.
Signature ID: 38056
Macromedia Flash ActionDefineFunction Memory Access Vulnerability
Threat Level: Warning
Industry ID: CVE-2005-2628
Signature Description: A remote code execution vulnerability exists in the Macromedia Flash plugin. The flaw is
created by insufficient validation checks of user input values. This vulnerability may be exploited by a malicious user
to inject and execute arbitrary code on the target host.The vulnerable program is the Internet Explorer plugin Flash.ocx.
The vulnerable Firefox and Opera plugin is the dynamically linked library NPSWF32.dll.The vulnerable function
handles the tagged data blocks, specifically the vulnerable ActionDefineFunction(0x9B) and