TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
687
Signature Description: The Mozilla Firefox web browser, Thunderbird email client, and SeaMonkey internet suite are
vulnerable to script execution when an add-on uses the 'about:blank' page. Add-ons are small pieces of software that
can add new features for these products. Add-ons that create 'about:blank' windows and populate them in certain ways
such as document creation through data: or javascript: URLs in new window can execute scripts with chrome
privileges. This behavior could cause security issues in certain extensions that are thinking that 'about:blank' does not
have chrome privileges. By convincing a victim to visit a specially-crafted web page containing an about:blank
window, a remote attacker could exploit this vulnerability to execute arbitrary code with chrome privileges. This
signature detects traffic using the content.location assignment.
Signature ID: 30321
Cisco IOS NHRP Request Packet Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-4286 Bugtraq: 25238
Signature Description: Cisco IOS is an operating system that is used on Cisco network devices. Cisco IOS fails to
properly handle Next Hop Resolution Protocol (NHRP) packets. By sending a specially crafted NHRP request with a
large value in Packet Length field of NHRP Fixed Header, buffer can be overflown. NHRP can operate in three ways,
at the link layer (Layer 2), over Generic Routing Encapsulation (GRE) and multipoint GRE (mGRE) tunnels and
directly on IP (IP protocol number 54). This vulnerability affects all three methods of operation. This signature triggers
when an attacker sending specially-crafted long data via on Protocol GRE(47). The Successful exploitation may allow
a remote attacker to overflow a buffer and execute arbitrary code on the target device. The vendor has issued fixed
versions and can be downloaded from Cisco advisory cisco-sa-20070808-nhrp.
Signature ID: 30322
Cisco IOS NHRP Request Packet Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-4286 Bugtraq: 25238
Signature Description: Cisco IOS is an operating system that is used on Cisco network devices. Cisco IOS fails to
properly handle Next Hop Resolution Protocol (NHRP) packets. By sending a specially crafted NHRP request with a
large value in Packet Length field of NHRP Fixed Header, buffer can be overflown. NHRP can operate in three ways,
at the link layer (Layer 2), over Generic Routing Encapsulation (GRE) and multipoint GRE (mGRE) tunnels and
directly on IP (IP protocol number 54). This vulnerability affects all three methods of operation. This signature triggers
when an attacker sending specially-crafted long data. The Successful exploitation may allow a remote attacker to
overflow a buffer and execute arbitrary code on the target device. The vendor has issued fixed versions and can be
downloaded from Cisco advisory cisco-sa-20070808-nhrp.
Signature ID: 30323
Cisco IOS NHRP Request Packet Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-4286
Bugtraq: 25238
Signature Description: Cisco IOS is an operating system that is used on Cisco network devices. Cisco IOS fails to
properly handle Next Hop Resolution Protocol (NHRP) packets. By sending a specially crafted NHRP request with a
large value in Packet Length field of NHRP Fixed Header, buffer can be overflown. NHRP can operate in three ways,
at the link layer (Layer 2), over Generic Routing Encapsulation (GRE) and multipoint GRE (mGRE) tunnels and
directly on IP (IP protocol number 54). This vulnerability affects all three methods of operation. This signature triggers
when an attacker sending specially-crafted long data via on Protocol 54. The Successful exploitation may allow a
remote attacker to overflow a buffer and execute arbitrary code on the target device. The vendor has issued fixed
versions and can be downloaded from Cisco advisory cisco-sa-20070808-nhrp.