TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
740
servers for Windows.Unlike MS FTP, acFTP supports extended FTP commands set, including APPE and REST for
resuming broken uploads and downloads. A vulnerability in acFTP has been reported, which can be exploited by
remote users to trigger denial of service conditions. The vulnerability is caused due to an error within the handling of
the argument passed to the "REST" command. This can be exploited to crash the FTP server via an overly long
argument that contains certain character sequences. acFTP version 1.4.and other versions may also be affected.The
vendor recommends users of existing acFTP.exe binary to make configuration changes to the OnStartup.rules.txt
configuration file to prevent the vulnerability from being exploited.
Signature ID: 32639
HTTP Winamp MP4 File Handling Memory Corruption
Threat Level: Severe
Industry ID: CVE-2007-2498
Bugtraq: 23723
Signature Description: Winamp is prone to a buffer-overflow vulnerability when it attempts to process certain
files.This issue occurs because the application fails to properly check boundaries on user-supplied data before copying
it to an insufficiently sized memory buffer.libmp4v2.dll in Winamp 5.02 through 5.34 allows user-assisted remote
attackers to execute arbitrary code via a certain.MP4 file.This issue affects Winamp 5.02 through 5.34.
Signature ID: 32641
HTTP Apache Server Address Disclosure Vulnerability
Threat Level: Severe
Bugtraq: 3169
Signature Description: A vulnerability has been discovered in Apache web server that may result in the disclosure of
the server's address.The problem occurs when a HTTP request containing the URI of a directory is submitted to the
server.If the URI does not contain a trailing '/' character, the server returns a 3xx redirection error code indicating that
further action must be taken in order to fulfill the request. When this occurs, a 'Location' response-header containing
the address of the server is returned as part of the response.In a situation where the request is redirected to the server
behind a firewall, this could lead to the disclosure of the server's internal network address.
Signature ID: 32642
HTTP Apache Linefeed Memory Allocation DOS
Threat Level: Severe
Industry ID: CVE-2003-0132
Bugtraq: 7254
Signature Description: Remote exploitation of a memory leak in the Apache HTTP Server causes the daemon to over
utilize system resources on an affected system.The problem is HTTP Server's handling of large chunks of consecutive
linefeed characters.The web server allocates an eighty-byte buffer for each linefeed character without specifying an
upper limit for allocation. Consequently, an attacker can remotely exhaust system resources by generating many
requests containing these characters.While this type of attack is most effective in an intranet setting, remote
exploitation over the Internet, while bandwidth intensive, is feasible.Remote exploitation could consume system
resources on a targeted system and, in turn, render the Apache HTTP daemon unavailable.iDEFENSE has performed
research using proof of concept exploit code to demonstrate the impact of this vulnerability.A successful exploitation
scenario requires between two and seven megabytes of traffic exchange.
Signature ID: 32643
HTTP eZnetwork HTTP Request Buffer Overflow
Threat Level: Severe
Bugtraq: 9167
Signature Description: The software suite includes packages such as eZ, eZnetwork, eZphotoshare and eZshare. Each
software package includes a web server (eznet.exe) that is automatically started on port 80/tcp when the system is