TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
454
Signature ID: 12111
VERITAS NetBackup Java User Interface Format String Vulnerability
Threat Level: Severe
Industry ID: CVE-2005-2715 Bugtraq: 15079
Signature Description: VERITAS NetBackup is a backup and recovery software solution. One of the components of
the Java Administration console for the NetBackup software, bpjava-msvc is used for authentication purposes. This
service listens on port 13722/tcp on both NetBackup client and server systems. A remotely exploitable format string
vulnerability exists in bpjava-msvc service. This vulnerability allows remote attackers to execute arbitrary code on
vulnerable NetBackup installations. Administrators are advised to close the TCP port 13722 for external users.
Signature ID: 12112
BomberClone Error Messages Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2006-0460 Bugtraq: 16697
Signature Description: BomberClone is a multi-player network game, it is free Bomberman-like game for Linux and
Windows. It features powerups that give you more strength, make you walk faster through the level, or let you drop
more bombs. BomberClone versions prior to 0.11.6.2 are vulnerable to a buffer overflow attack. A renote attacker
could send a long error message to the game server, This issue is due to a failure in the application to perform proper
boundary checks when processing these type of overly long error messages. By this type of messages the remote
attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the user running
BomberClone. This event generate when the packet contains hex values |08 5f e8 77| as error message.
Signature ID: 12113
BomberClone Error Messages Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2006-0460 Bugtraq: 16697
Signature Description: BomberClone is a multi-player network game, it is free Bomberman-like game for Linux and
Windows. It features powerups that give you more strength, make you walk faster through the level, or let you drop
more bombs. BomberClone versions prior to 0.11.6.2 are vulnerable to a buffer overflow attack. A renote attacker
could send a long error message to the game server, This issue is due to a failure in the application to perform proper
boundary checks when processing these type of overly long error messages. By this type of messages the remote
attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the user running
BomberClone. This event is generated when the packet contains hex values |da b1 da 77| as error message.
Signature ID: 12114
BomberClone Error Messages Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2006-0460
Bugtraq: 16697
Signature Description: BomberClone is a multi-player network game, it is free Bomberman-like game for Linux and
Windows. It features powerups that give you more strength, make you walk faster through the level, or let you drop
more bombs. BomberClone versions prior to 0.11.6.2 are vulnerable to a buffer overflow attack. A renote attacker
could send a long error message to the game server, This issue is due to a failure in the application to perform proper
boundary checks when processing these type of overly long error messages. By this type of messages the remote
attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the user running
BomberClone. This event generate when the packet contains hex values |64 f1 ff bf| as error messsage.