TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
453
Signature ID: 12106
Access to VqServer Admin Service
Threat Level: Information
Industry ID: CVE-2000-0766
Bugtraq: 1610
Signature Description: VqServer is a personal web server from VqSoft. Apart from a web server on port 80 (and 8080),
it also runs an administrative interface on port 9090. This interface is used to manage the server. Access to this port
from external network can be treated as a security risk.
Signature ID: 12107
LPRng User-Supplied Format String Vulnerability
Threat Level: Warning
Industry ID: CVE-2000-0917 Bugtraq: 1712
Signature Description: LPRng is an implementation of the Berkeley lpr print spooling protocol. Some versions are
vulnerable to a format-string attack that may present a remote attacker with the ability to execute arbitrary code using
the privileges of the LPD daemon owner typically root. LPRng contains a function, use_syslog(), that returns user input
to a string in LPRng that is passed to syslog() as the format string. As a result, it is possible to corrupt the program's
flow of execution by entering malicious format specifiers.
Signature ID: 12108
LPRng User-Supplied Format String Vulnerability
Threat Level: Warning
Industry ID: CVE-2000-0917 Bugtraq: 1712
Signature Description: LPRng is an implementation of the Berkeley lpr print spooling protocol. Some versions are
vulnerable to a format-string attack that may present a remote attacker with the ability to execute arbitrary code using
the privileges of the LPD daemon owner typically root. LPRng contains a function, use_syslog(), that uses user's input
format in LPRng that is passed to syslog() as the format string. As a result, it is possible to corrupt the program's flow
of execution by entering malicious format specifiers.
Signature ID: 12109
Solaris x86 nlps_server Buffer Overflow Vulnerability
Threat Level: Warning
Industry ID: CVE-1999-1588
Bugtraq: 2319
Signature Description: The program nlps_server provides print services for Solaris System V machines. This server
listens on TCP port 2766 for printing requests. A vulnerability exists in some versions of the nlps server daemon on
certain versions of x86 Solaris. By supplying a long string to a vulnerable nlps server daemon, remote attackers could
execute arbitrary code on an infected machine with root privileges.
Signature ID: 12110
VERITAS NetBackup Volume Manager Daemon Buffer Overflow
Threat Level: Severe
Industry ID: CVE-2005-3116 Bugtraq: 15353
Signature Description: VERITAS NetBackup is a backup and recovery software solution. A buffer overflow
vulnerability exists in a shared library used by Virtual Manager Daemon of NetBackup versions 5.0 and 5.1. The buffer
overflow occurs due to improper bounds checking of user input. A remote attacker who can successfully exploit this
vulnerability can gain access to the affected library and possibly execute arbitrary code with elevated privileges.