TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
55
characters in the recipient email address. This is possible as open() call is used without filtering user input. An attacker
can use shell meta characters such as '|' to execute arbitrary code.
Signature ID: 308
IIS appended dot file disclosure vulnerability
Threat Level: Warning
Industry ID: CVE-1999-0154 CVE-1999-0253 Bugtraq: 2074
Signature Description: This version of Microsoft Internet Information Server (IIS) displays the source to active server
pages (.asp files), if a period is appended to the URL. Scripting information, in addition to other data in the file, is
visible. Potentially proprietary web server files (such as .ASP, .HTX, and .IDC file name extensions) may contain
sensitive information (such as user IDs and passwords) embedded in the source code but not normally available to
remote users.
Signature ID: 310
Apache mod_cookies Buffer Overflow Vulnerability
Threat Level: Warning
Industry ID: CVE-1999-0071 Bugtraq: 1821
Signature Description: The Apache Project is a collaborative software development effort aimed at creating a robust,
commercial-grade, feature rich, and freely-available source code implementation of an HTTP (Web) server. Apache
Software Foundation Apache 0.8.11 to 1.1.1 (inclusive) are vulnerable to a buffer overflow attack. This overflow is due
to function make_cookie, in mod_cookies.c using a 100 byte buffer. As a result, remote attackers can exploit this
vulnerability to execute arbitrary code on the server with the privileges of Apache server.
Signature ID: 311
Apache Debian Information disclosure Vulnerability
Threat Level: Warning
Industry ID: CVE-1999-0678 Bugtraq: 318
Signature Description: The Debian GNU/Linux 2.1 apache package allows any remote user to view /usr/doc if default
settings are used. This is because 'srm.conf' file is preconfigured with the alias mapping '/doc/' to '/usr/doc/'. This allows
a remote attacker to gain access to sensitive information such as the versions of the software installed. An attacker can
use this information to make more focused attacks.
Signature ID: 313
IIS .htr file access misconfiguration vulnerability
Threat Level: Warning
Industry ID: CVE-1999-0407 Bugtraq: 2110
Signature Description: Microsoft Internet Information Server (IIS) is a popular web server package for Windows based
platforms. Microsoft IIS 4.0 installs a remotely accessible directory called '/IISADMPWD' which is mapped to
'c:\winnt\system32\inetsrv\iisadmpwd'. This directory contains a number of vulnerable '.HTR' files. These files were
designed to allow system administrators the ability to provide HTTP based password change services to network users.
These files can be used to determine whether or not an account exists on the host, as well as to conduct brute force
attacks. The response messages from the server allow<br>an attacker to determine if his request was valid or not.
These files can also be used to conduct the same type of attacks on other hosts in the LAN. Thus, an attacker can gain
access to any system on the same LAN using this vulnerability.
Signature ID: 314
IIS sample script source code disclosure vulnerability
Threat Level: Warning
Industry ID: CVE-1999-0739
CVE-2002-1744 CVE-2002-1745