TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
693
ActiveX control provided by DXTLIPI.DLL that is produced by Live Picture Corporation. The
DXSurface.LivePicture.FLashPix.1(DXTLIPI.DLL) ActiveX control contains a buffer overflow vulnerability in the
SourceUrl() property. By convincing a user to visit a specially-crafted Web page that passes an overly long string to the
'SourceUrl' property, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the
victim's browser to crash. Disable the FlashPix ActiveX control in Internet Explorer by setting the kill bit for CLSID
201EA564-A6F6-11D1-811D-00C04FB6BD36. This signature detects attacks using CLSID and %uHHHH encoding.
Signature ID: 30343
Microsoft DirectX Media SDK DXTLIPI.DLL ActiveX Control Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-4336
Bugtraq: 25279
Signature Description: Microsoft DirectX is a collection of application programming interfaces for handling tasks
related to multimedia, especially game programming and video, on Microsoft platforms.. The DirectX System
Development Kit (SDK) is used to develop software using DirectX. The Microsoft DirectX Media 6.0 SDK includes an
ActiveX control provided by DXTLIPI.DLL that is produced by Live Picture Corporation. The
DXSurface.LivePicture.FLashPix.1(DXTLIPI.DLL) ActiveX control contains a buffer overflow vulnerability in the
SourceUrl() property. By convincing a user to visit a specially-crafted Web page that passes an overly long string to the
'SourceUrl' property, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the
victim's browser to crash. Disable the FlashPix ActiveX control in Internet Explorer by setting the kill bit for CLSID
201EA564-A6F6-11D1-811D-00C04FB6BD36. This signature detects attacks using CLSID in UTF encoding.
Signature ID: 30344
Microsoft DirectX Media SDK DXTLIPI.DLL ActiveX Control Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-4336 Bugtraq: 25279
Signature Description: Microsoft DirectX is a collection of application programming interfaces for handling tasks
related to multimedia, especially game programming and video, on Microsoft platforms.. The DirectX System
Development Kit (SDK) is used to develop software using DirectX. The Microsoft DirectX Media 6.0 SDK includes an
ActiveX control provided by DXTLIPI.DLL that is produced by Live Picture Corporation. The
DXSurface.LivePicture.FLashPix.1(DXTLIPI.DLL) ActiveX control contains a buffer overflow vulnerability in the
SourceUrl() property. By convincing a user to visit a specially-crafted Web page that passes an overly long string to the
'SourceUrl' property, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the
victim's browser to crash. Disable the FlashPix ActiveX control in Internet Explorer by setting the kill bit for CLSID
201EA564-A6F6-11D1-811D-00C04FB6BD36. This signature detects attacks using PROGID and %uHHHH
encoding.
Signature ID: 30345
Microsoft DirectX Media SDK DXTLIPI.DLL ActiveX Control Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-4336 Bugtraq: 25279
Signature Description: Microsoft DirectX is a collection of application programming interfaces for handling tasks
related to multimedia, especially game programming and video, on Microsoft platforms.. The DirectX System
Development Kit (SDK) is used to develop software using DirectX. The Microsoft DirectX Media 6.0 SDK includes an
ActiveX control provided by DXTLIPI.DLL that is produced by Live Picture Corporation. The
DXSurface.LivePicture.FLashPix.1(DXTLIPI.DLL) ActiveX control contains a buffer overflow vulnerability in the
SourceUrl() property. By convincing a user to visit a specially-crafted Web page that passes an overly long string to the
'SourceUrl' property, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the
victim's browser to crash. Disable the FlashPix ActiveX control in Internet Explorer by setting the kill bit for CLSID
201EA564-A6F6-11D1-811D-00C04FB6BD36. This signature detects attacks using PROGID in UTF encoding.