TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
735
Signature ID: 32611
HTTP ActSoft DVDTools OCX ActiveX Buffer Overflow
Threat Level: Severe
Industry ID: CVE-2007-0976
Bugtraq: 22558
Signature Description: The ActSoft DVD Tools ActiveX control (dvdtools.ocx) is vulnerable to a buffer overflow,
because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized
memory buffer.By persuading a victim to visit a malicious Web page that passes an overly long string to the
DVD_TOOLS.OpenDVD method, a remote attacker could overflow a buffer and possibly execute arbitrary code on the
system or cause the application to crash.
Signature ID: 32612
HTTP BrowseDialog ActiveX Control CCRPBDS6.DLL DoS
Threat Level: Severe
Industry ID: CVE-2007-1162 Bugtraq: 22645
Signature Description: Microsoft Internet Explorer is vulnerable to a denial of service, caused by improper validation
of the IsFolderAvailable and RootFolder property of the Common Controls Replacement Project (CCRP)
BrowseDialog ActiveX control (ccrpbds6.dll).A remote attacker could exploit this vulnerability to cause the victim's
browser to crash, if the attacker could persuade the victim to visit a malicious Web page.
Signature ID: 32613
HTTP DivX Player DivXBrowserPlugin npdivx32.dll DoS
Threat Level: Severe
Industry ID: CVE-2007-0429 Bugtraq: 22133
Signature Description: DivX Player 6.4.1 is vulnerable to a denial of service, caused by a vulnerability in the
DivXBrowserPlugin ActiveX control (npdivx32.dll).A remote attacker could exploit this vulnerability to cause the
victim's browser to crash, if the attacker could persuade the victim to visit a malicious Web page.
Signature ID: 32614
HTTP Acer LunchApp.APlunch ActiveX Remote Code Execution
Threat Level: Severe
Signature Description: A vulnerability has been identified in LunchApp.APlunch ActiveX Control, which could be
exploited by remote attackers to take complete control of an affected system. This flaw is due to a design error when
using the insecure "Run()" method, which could be exploited by remote attackers to execute arbitrary binaries on a
vulnerable system by tricking a user into visiting a specially crafted Web page.Affected Products are Acer
LunchApp.APlunch ActiveX Control version 1.0.0.0 and prior.
Signature ID: 32615
HTTP NetSprint Toolbar ActiveX Denial of Service
Threat Level: Severe
Industry ID: CVE-2007-2678
Bugtraq: 23530
Signature Description: Netsprint Toolbar is vulnerable to a buffer overflow, caused by improper bounds checking by
the toolbar.dll ActiveX control.By persuading a victim to visit a specially-crafted Web page, a remote attacker could
overflow a buffer and possibly execute arbitrary code on the system or cause the victim's browser to crash.NetSprint
Toolbar ActiveX Control 1.1 is vulnerable to this issue, other versions may also be vulnerable.