TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
225
Signature ID: 1551
Microsoft Internet Explorer DirectAnimation.DATuple ActiveX Arbitrary Code Execution
Vulnerability(1)
Threat Level: Severe
Industry ID: CVE-2006-3638 Bugtraq: 19340
Signature Description: Microsoft Internet Explorer(IE) allows instantiation of COM objects not designed for use in the
browser. Microsoft IE does not properly handle uninitialized COM objects. Microsoft COM is a technology that allows
programmers to create reusable software components that can be incorporated into applications to extend their
functionality. Microsoft Internet Explorer(Microsoft Internet Explorer versions 5.01 and 6) is a denial of service
vulnerability. This vulnerability is caused due to memory corruption in the DirectAnimation.DATuple ActiveX control
Nth() method. Successful exploits may allow attackers to crash the application, denying further service to users. This
issue may also be exploited to execute arbitrary machine-code. Users are advised to set the killbit for for the vulnerable
ActiveX control's CLSID 5DFB2651-9668-11D0-B17B-00C04FC2A0CA.
Signature ID: 1552
Microsoft Internet Explorer DirectAnimation.DATuple ActiveX Arbitrary Code Execution
Vulnerability(2)
Threat Level: Severe
Industry ID: CVE-2006-3638 Bugtraq: 19340
Signature Description: Microsoft Internet Explorer(IE) allows instantiation of COM objects not designed for use in the
browser. Microsoft IE does not properly handle uninitialized COM objects. Microsoft COM is a technology that allows
programmers to create reusable software components that can be incorporated into applications to extend their
functionality. Microsoft Internet Explorer(Microsoft Internet Explorer versions 5.01 and 6) is a denial of service
vulnerability. This vulnerability is caused due to memory corruption in the DirectAnimation.DATuple ActiveX control
Nth() method. Successful exploits may allow attackers to crash the application, denying further service to users. This
issue may also be exploited to execute arbitrary machine-code.
Signature ID: 1554
Microsoft Internet Explorer VML fill method Buffer overflow Vulnerability(1)
Threat Level: Severe
Industry ID: CVE-2006-4868
CVE-2006-3866 Bugtraq: 20096
Signature Description: Microsoft Internet Explorer is a series of graphical web browser developed by Microsoft.
Microsoft Internet Explorer (Microsoft Internet Explorer 5.01 SP4, 6 SP1) is a stack-based buffer overflow
vulnerability in "VGX.dll" in the processing of Vector Markup Language(VML) text. VML(Vector Markup Language)
is an XML(Extensible Markup Language) language used to produce vector graphics. By creating a malicious HTML
document containing specially-crafted VML document containing an overly long "fill" method inside a "rect" tag with
the Internet Explorer browser, a remote attacker could overflow a buffer and execute arbitrary code on the system with
permissions of the victim user. An attacker could exploit this vulnerability by hosting the file on a web site or sending it
to a victim as an email attachment.
Signature ID: 1555
Microsoft Internet Explorer VML Buffer overflow Vulnerability(2)
Threat Level: Warning
Industry ID: CVE-2006-4868
CVE-2006-3866 Bugtraq: 20096
Signature Description: Microsoft Internet Explorer is a series of graphical web browser developed by Microsoft.
Microsoft Internet Explorer (Microsoft Internet Explorer 5.01 SP4, 6 SP1) is a stack-based buffer overflow
vulnerability in "VGX.dll" in the processing of Vector Markup Language(VML) text. VML(Vector Markup Language)
is an XML(Extensible Markup Language) language used to produce vector graphics. By creating a malicious HTML
document containing specially-crafted VML document containing an overly long "fill" method inside a "rect" tag with