TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
698
Signature ID: 30360
MS Visual Basic 6 pdwizard.ocx ActiveX Control Remote Code Execution Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-3041 Bugtraq: 25295
Signature Description: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the
system, caused by a memory corruption vulnerability that occurs when Internet Explorer attempts to instantiate the
pdwizard.ocx object as an ActiveX control. An attacker could exploit this vulnerability by creating a specially-crafted
Web page containing an invalid object, and persuading the victim to visit the page. Install the vendor supplied patch
mentioned in MS07-045 or set the killbit for CLSID 0DDF3B5C-E692-11D1-AB06-00AA00BDD685.
Signature ID: 30361
MS Visual Basic 6 pdwizard.ocx ActiveX Control Remote Code Execution Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-3041 Bugtraq: 25295
Signature Description: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the
system, caused by a memory corruption vulnerability that occurs when Internet Explorer attempts to instantiate the
pdwizard.ocx object as an ActiveX control. An attacker could exploit this vulnerability by creating a specially-crafted
Web page containing an invalid object in UTF-16 encoded form, and persuading the victim to visit the page. Install the
vendor supplied patch mentioned in MS07-045 or set the killbit for CLSID 0DDF3B5C-E692-11D1-AB06-
00AA00BDD685.
Signature ID: 30362
MS Visual Basic 6 pdwizard.ocx ActiveX Control Remote Code Execution Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-3041 Bugtraq: 25295
Signature Description: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the
system, caused by a memory corruption vulnerability that occurs when Internet Explorer attempts to instantiate the
pdwizard.ocx object as an ActiveX control. An attacker could exploit this vulnerability by creating a specially-crafted
Web page containing an invalid object, and persuading the victim to visit the page. Install the vendor supplied patch
mentioned in MS07-045 or set the killbit for CLSID corresponding to the progid PDWizard.File to resolve this issue.
Signature ID: 30363
MS Visual Basic 6 pdwizard.ocx ActiveX Control Remote Code Execution Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-3041 Bugtraq: 25295
Signature Description: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the
system, caused by a memory corruption vulnerability that occurs when Internet Explorer attempts to instantiate the
pdwizard.ocx object as an ActiveX control. An attacker could exploit this vulnerability by creating a specially-crafted
Web page containing an invalid object in UTF-16 encoded form, and persuading the victim to visit the page. Install the
vendor supplied patch mentioned in MS07-045 or set the killbit for CLSID corresponding to the progid PDWizard.File
to resolve this issue.
Signature ID: 30364
Mercury Mail Transport System AUTH CRAM-MD5 Buffer Overflow Vulnerability
Threat Level: Warning
Industry ID: CVE-2007-4440 Bugtraq: 25357
Signature Description: The Mercury Mail Transport System is a Mail Server - a program that sends and receives mail
on behalf of a group of users on a machine or local area network. Mercury Mail Transport System is vulnerable to a