TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
756
Signature ID: 32745
HTTP Apache Web Server Mod_Cache DoS (max-stale)
Threat Level: Warning
Industry ID: CVE-2007-1863 Bugtraq: 24649
Signature Description: Cache-Control header is used to signal how long a representation can be cached. mod_cache
has a defect which can cause the httpd process to crash when cache is enabled and a maliciously formed Cache-Control
request header is received. mod_cache does not sanity check certain parts of the request, and can crash the active child
process when processing certain invalid requests. If a threaded Multi-Processing Module is used, this can result in
denial of service conditions.It cause a segmentation fault if one of the Cache-Control header "max-stale" has no value
assigned.
Signature ID: 32746
HTTP Apache Web Server Mod_Cache DoS (min-fresh)
Threat Level: Warning
Industry ID: CVE-2007-1863 Bugtraq: 24649
Signature Description: Cache-Control header is used to signal how long a representation can be cached. mod_cache
has a defect which can cause the httpd process to crash when cache is enabled and a maliciously formed Cache-Control
request header is received. mod_cache does not sanity check certain parts of the request, and can crash the active child
process when processing certain invalid requests. If a threaded Multi-Processing Module is used, this can result in
denial of service conditions.It cause a segmentation fault if one of the Cache-Control header "min-fresh" has no value
assigned.
Signature ID: 32747
HTTP Apache Web Server Mod_Cache DoS (s-maxage)
Threat Level: Warning
Industry ID: CVE-2007-1863 Bugtraq: 24649
Signature Description: Cache-Control header is used to signal how long a representation can be cached. mod_cache
has a defect which can cause the httpd process to crash when cache is enabled and a maliciously formed Cache-Control
request header is received. mod_cache does not sanity check certain parts of the request, and can crash the active child
process when processing certain invalid requests. If a threaded Multi-Processing Module is used, this can result in
denial of service conditions.It cause a segmentation fault if one of the Cache-Control header "s-maxage" has no value
assigned.
Signature ID: 32768
HTTP MS Excel NULL Pointer Dereference DoS POC_2
Threat Level: Warning
Industry ID: CVE-2007-3029 Bugtraq: 22555
Signature Description: These name spaces provide a consistent structure for data used within Office applications and
for reliable data exchanges with other applications and systems and it defines elements and attributes used to describe
more complex features of Excel, such as PivotTables, worksheet options, and validation. An attacker may use this and
causes an unspecified calculation error when handling version-related information or an error in the validation of the
number of active worksheets (By opening multiple worksheets) using Microsoft Excel.
Signature ID: 32780
Microsoft ASP.NET URI Canonicalization Unauthorized Web Access vulnerability
Threat Level: Warning
Industry ID: CVE-2004-0847 Bugtraq: 11342
Signature Description: Microsoft ASP.NET Framework could allow a remote attacker to bypass security restrictions,