TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
199
execute arbitrary code on the system and take complete control over the victim's system. This signature detects access
to MSWC.MyInfo.1 COM object of MyInfo ASP Component - 'MyInfo.dll'.
Signature ID: 1398
Microsoft Internet Explorer COM Object Instantiation Memory Corruption Vulnerability
Threat Level: Warning
Industry ID: CVE-2005-2831 Bugtraq: 15827
Signature Description: Microsoft Internet Explorer 5.01, 5.5 and 6 are prone to a memory corruption vulnerability that
is related to the instantiation of COM objects. COM objects may corrupt system memory and facilitate arbitrary code
execution in the context of the currently logged in user on the affected computer. When instantiating a COM objects as
an ActiveX control, a memory corruption error can occur. A remote attacker could exploit this vulnerability by creating
a malicious Web page and hosting it on a Web site or by sending it to a victim as an HTML email. The attacker could
execute arbitrary code on the system and take complete control over the victim's system. User can set a kill bit to the
clsid 8E71888A-423F-11D2-876E-00A0C9082467 to resolve this issue
Signature ID: 1399
Microsoft Internet Explorer COM Object Instantiation Memory Corruption Vulnerability
Threat Level: Warning
Industry ID: CVE-2005-2831 Bugtraq: 15827
Signature Description: Microsoft Internet Explorer 5.01, 5.5 and 6 are prone to a memory corruption vulnerability that
is related to the instantiation of COM objects. COM objects may corrupt system memory and facilitate arbitrary code
execution in the context of the currently logged in user on the affected computer. When instantiating a COM objects as
an ActiveX control, a memory corruption error can occur. A remote attacker could exploit this vulnerability by creating
a malicious Web page and hosting it on a Web site or by sending it to a victim as an HTML email. The attacker could
execute arbitrary code on the system and take complete control over the victim's system. This signature detects access
to Creator.CdCreator.1 COM object of CdCreator - 'creator.dll'.
Signature ID: 1400
Microsoft Internet Explorer COM Object Instantiation Memory Corruption Vulnerability
Threat Level: Warning
Industry ID: CVE-2005-2831 Bugtraq: 15827
Signature Description: Microsoft Internet Explorer 5.01, 5.5 and 6 are prone to a memory corruption vulnerability that
is related to the instantiation of COM objects. COM objects may corrupt system memory and facilitate arbitrary code
execution in the context of the currently logged in user on the affected computer. When instantiating a COM objects as
an ActiveX control, a memory corruption error can occur. A remote attacker could exploit this vulnerability by creating
a malicious Web page and hosting it on a Web site or by sending it to a victim as an HTML email. The attacker could
execute arbitrary code on the system and take complete control over the victim's system. This signature detects access
to Creator.CdDevice.1 COM object of CdDevice Class - 'creator.dll'.
Signature ID: 1401
Microsoft IE Nested OBJECT Tag Memory Corruption Vulnerability
Threat Level: Information
Industry ID: CVE-2006-1992
CVE-2006-2218 Bugtraq: 17820,17658
Signature Description: Microsoft Internet Explorer is prone to a memory-corruption vulnerability. This issue is due to a
flaw in the application in handling nested OBJECT tags in HTML content, which triggers a NULL dereference. An
attacker could exploit this issue via a malicious web page to potentially execute arbitrary code in the context of the
currently logged-in user, but this has not been confirmed. Exploit attempts likely result in crashing the affected
application. Attackers could exploit this issue through HTML email/newsgroup postings or through other applications
that employ the affected component.