TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
178
Signature ID: 1298
PCCS Mysql Database Admin Tool Username/Password Exposure Vulnerability
Threat Level: Warning
Industry ID: CVE-2000-0707 Bugtraq: 1557
Signature Description: The PCCS-Linux MySQL Database Admin Tool is a Web-based front-end to the MySQL
database server written in PHP. PCCS-Linux MySQLDatabase Admin Tool 1.2.4, PCCS-Linux MySQLDatabase
Admin Tool 1.2.3 are vulnerable to Gain access. The default installation installs an include file in a directory that can
be accessed by the web server. This include file, dbconnect.inc, contains information such as the username and
password used to connect to the database in plain text format that can be disclosed if it is requested via http. PCCS
MySQL DB Admin Tool v1.2.3 and prior are affected by this issue. Update the PCCS-Linux MySQLDatabase Admin
Tool 1.2.5 version.
Signature ID: 1299
Netscape Communicator Long Argument Vulnerability
Threat Level: Warning
Industry ID: CVE-1999-1189 CVE-2000-1187 Bugtraq: 822
Signature Description: Netscape Navigator and Netscape are the names for the proprietary web browser, and the
flagship product of the Netscape Communications Corporation. Netscape Navigator/Communicator 4.7 is vulnerable to
buffer overflow, By creating a specially-crafted URL containing an overly long argument to an .asp, .cgi, .html, or .pl
file and hosting it on a Web page or sending it within an email message, a remote attacker can overflow a buffer and
cause the program to crash or execute arbitrary commands on the victim's system, once the URL link is clicked.
Signature ID: 1300
NetScape Browser Buffer Overflow Vulnerability while parsing HTML code
Threat Level: Warning
Industry ID: CVE-2000-1187 CVE-1999-1189 Bugtraq: 822
Signature Description: Netscape Navigator and Netscape are the names for the proprietary web browser, and the
flagship product of the Netscape Communications Corporation. Netscape Navigator/Communicator 4.7 and Netscape
4.75 are vulnerable, these allowing attackers to execute arbitrary code. A malicious user(remote attacker) could send a
specially crafted request to the server this request contains overly long password value, after received the request it is
not validating properly the user given inputs, so while processing the request buffer overflow will occur, then the
remote attacker execute arbitrary code on a visiting user's computer resulting in a loss of confidentiality and integrity.
Signature ID: 1301
PHP File Upload GLOBALS Overwrite Vulnerability
Threat Level: Warning
Industry ID: CVE-2005-3390 Bugtraq: 15250
Signature Description: PHP is a widely-used general-purpose scripting language that is especially suited for Web
development and can be embedded into HTML. PHP versions 4.x up to 4.4.0 and 5.x up to 5.0.5 are susceptible to a
vulnerability that allows attackers to execute arbitrary PHP code on the target system when 'register_globals' is turned
on. A remote user can send a form-data POST request containing a fileupload field with the name "GLOBALS" to
cause the $GLOBALS array to be overwritten. This allow the attackers to execute arbitrary PHP code or further exploit
latent vulnerabilities in PHP scripts.
Signature ID: 1302
PHP File Upload GLOBAL Variable Overwrite Vulnerability
Threat Level: Warning
Industry ID: CVE-2005-3390 Bugtraq: 15250