TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
30
Signature ID: 169
Pi3Web tstisap.dll overflow vulnerability
Threat Level: Warning
Industry ID: CVE-2001-0302 CVE-2001-0303 Bugtraq: 2381 Nessus: 10618
Signature Description: John Roy Pi3Web web server is a free, multithreaded, highly configurable and extensible HTTP
server and development environment for cross platform internet server development and deployment. The ISAPI
application, tstisapi.dll in John Roy Pi3Web web server 1.0.1 has multiple vulnerabilities. A buffer overflow
vulnerability exists due to failure in properly handle user supplied input. Requesting a specially crafted URL will cause
the buffer to overflow and possibly allow the execution of arbitrary code. It is also possible to disclose the physical
path to the web root by requesting an invalid URL.
Signature ID: 170
PlusMail vulnerability
Threat Level: Severe
Industry ID: CVE-2000-0074 Bugtraq: 2653 Nessus: 10181
Signature Description: PowerScripts PlusMail Web Control Panel is a web-based administration suite for maintaining
mailing lists, mail aliases, and web sites. In PowerScripts PlusMail WebConsole 1.0, it is possible to change the
administrative username and password without knowing the current password, by submitting the arguments
"new_login" with the value "reset password", "username" with the new login name as value, "password" and
"password1" with matching new password values to the plusmail script (typically available at /cgi-bin/plusmail). The
web console can then be used to launch a range of potentially destructive activities including changing of e-mail
aliases, mailing lists, web site editing, and various other privileged tasks.
Signature ID: 171
CGI-World Poll It Internal Variable Override Vulnerability
Threat Level: Warning
Industry ID: CVE-2000-0590 Bugtraq: 1431
Signature Description: 'Poll It' is a Perl CGI application used to create and maintain opinion polls on websites. The
program relies on a number of internal variables. These variables can be overwritten by any remote user by specifying
the new value as a variable in the GET request. This is due to the fact that 'Poll It' overwrites variables to user-supplied
values after it sets them to the internally-specified defaults. This can lead to unauthorized file reads, as well as
potentially other compromises.
Signature ID: 172
Cognos Powerplay WE Vulnerability
Threat Level: Warning
Bugtraq: 491 Nessus: 10187
Signature Description: Cognos Powerplay Web Edition is a commercial Business Performance Measurement and
Reporting application. It is an Online Analytical Processing(OLAP) software. In any OLAP system, the collection of
data is represented as a 'Cube'. Cognos Powerplay Web Edition 4.0 to 6.5 (inclusive) may serve data cubes in a non-
secure manner. Execution of the PowerPlay CGI pulls cube data into files in an unprotected temporary directory. These
files are then fed back to frames in the browser. It is possible for an unauthenticated user to view these data files before
they are purged.
Signature ID: 173
WEB-CGI printenv access vulnerability
Threat Level: Warning
Industry ID: CVE-2000-1205 CVE-2007-4049 Bugtraq: 4431 Nessus: 10188