TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
232
Signature ID: 1728
SmarterTools SmarterMail login.aspx Buffer Overflow Vulnerability
Threat Level: Information
Industry ID: CVE-2004-2587
Signature Description: SmarterTools SmartMail is a mail server application for Microsoft Windows. SmarterMail
1.6.1511 and 1.6.1529 uses the file "login.aspx" to authenticate a valid user. The file 'login.aspx' uses post method and
takes txtusername parameter which is prone to buffer overflow. By sending a large string of more than 980 characters
buffer overflow can be produced. An attacker can execute arbitrary code by exploiting this vulnerability.
Signature ID: 1729
HTTP Error 403 - Forbidden response from Webserver vulnerability
Threat Level: Information
Signature Description: HTTP(HyperText Transfer Protocol) is a protocol used by the World Wide Web. It is used for
transferring files(text, graphic, images, sound, video, and other multimedia files) on the <br>World Wide Web. This
rule will trigger when the user access the site, if any issues are occurred inside the network then 403 Forbidden error
message is detected. This may occur, when the URL ending with '/' then "403 Forbidden" error message is returned.
Signature ID: 1730
WEB-IIS UploadScript11.asp access Vulnerability
Threat Level: Information
Industry ID: CVE-2001-0938 Bugtraq: 3608 Nessus: 11746
Signature Description: AspUpload is an ASP extension which allows remote users to upload files through html form.
AspUpload(AspUpload version 2.1) will receive the uploaded streams and save them in the server as files. It create
sample scripts(such as UploadScript11.asp) during installation. A remote attacker can exploit this vulnerability to
upload and read arbitrary files, and list arbitrary directories, via a ..(dot dot) in the filename parameter in
UploadScript11.asp or DirectoryListing.asp. No remedy available as of July 2008.
Signature ID: 1731
Virtual Programing VP-ASP shopdisplayproducts.asp SQL injection vulnerability
Threat Level: Severe
Bugtraq: 9134 Nessus: 11942
Signature Description: Virtual Programming VP-ASP is a shopping cart application that is written in ASP and supports
MS-ACCESS, MySQL and MSSQL Databases. The script shopdisplayproducts.asp in VP-ASP is vulnerable to a SQL
injection attack that allow an attacker to gain administrative access to the installed VP-ASP Shopping Cart software or
execute arbitrary commands on a target's system. Affected Platform is Rocksalt International VP-ASP 5.00
Signature ID: 1732
Virtual Programing VP-ASP shopsearch.asp SQL injection vulnerability
Threat Level: Severe
Bugtraq: 9134 Nessus: 11942
Signature Description: Virtual Programming VP-ASP is a shopping cart application that is written in ASP and supports
MS-ACCESS, MySQL and MSSQL Databases. The script shopsearch.asp in VP-ASP is vulnerable to a SQL injection
attack that allow an attacker to gain administrative access to the installed VP-ASP Shopping Cart software or execute
arbitrary commands on a target's system. Vulnerable platforms are VP-ASP 4.0 and 5.0.