TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
734
Signature ID: 32606
HTTP McAfee SecurityCenter Subscription Manager Buffer Overflow
Threat Level: Severe
Industry ID: CVE-2007-2584 Bugtraq: 23888,23909
Signature Description: The 'McSubMgr.DLL' ActiveX control shipped with McAfee Security Center is prone to a
buffer-overflow vulnerability.The software fails to perform sufficient boundary checks of user-supplied input before
copying it to an insufficiently sized memory buffer.Multiple McAfee products are vulnerable to a buffer overflow,
caused by improper bounds checking by the MCSUBMGR ActiveX control's IsOldAppInstalled() function.By
persuading a victim to visit a specially-crafted Web page, a remote attacker could overflow a buffer and execute
arbitrary code on the system with the victim's privileges.
Signature ID: 32607
HTTP Microsoft Outlook ole32.dll ActiveX DoS
Threat Level: Severe
Industry ID: CVE-2006-6659 Bugtraq: 21649
Signature Description: Microsoft Outlook is vulnerable to a denial of service caused by a vulnerability in the Outlook
Recipient Control ActiveX control (ole32.dll) in Windows XP SP2.A remote attacker could exploit this vulnerability to
cause a victim's browser to crash by persuading the victim to visit a malicious Web page.
Signature ID: 32608
HTTP RealPlayer IERPPLUG.DLL ActiveX Control DoS
Threat Level: Severe
Industry ID: CVE-2006-6847 Bugtraq: 21802
Signature Description: RealNetworks RealPlayer is vulnerable to a denial of service, caused by a vulnerability in the
ierpplug.dll ActiveX control. A remote attacker could exploit this vulnerability to cause the victim's browser to crash, if
the attacker could persuade the victim to visit a malicious Web page that passes specially-crafted arguments to the
RealPlayer.OpenURLInPlayerBrowser() method.RealPlayer version 10.5 is vulnerable to this issue; other versions may
also be affected.
Signature ID: 32609
HTTP Rediff Bol Downloader ActiveX Control Remote Code Execution
Threat Level: Severe
Industry ID: CVE-2006-6838
Bugtraq: 21831
Signature Description: The Rediff Bol Downloader ActiveX(OCX) control could allow a remote attacker to execute
arbitrary local files and obtain sensitive information.An attacker could exploit this vulnerability by persuading a victim
to visit a specially-crafted Web page containing a URL in the url vbscript parameter.
Signature ID: 32610
HTTP WinZip ActiveX Control Remote Code Execution 1
Threat Level: Severe
Industry ID: CVE-2006-5198
CVE-2006-3890 Bugtraq: 21060,21108
Signature Description: The FileView ActiveX control(WZFILEVIEW.FileViewCtrl.61) could allow a remote attacker
to execute arbitrary code on the system.The FileView ActiveX control contains several unsafe methods and is marked
"safe for scripting" and "safe for initialization".A remote attacker could exploit this vulnerability to execute arbitrary
code on the victim's system, if the attacker could persuade the victim to visit a malicious Web site and the victim is
using an affected version of WinZip.WinZip versions in the 10.0 series prior to build 7245 are vulnerable to these
issues.