TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
764
file, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to
crash, if the attacker could persuade the victim to open the malicious file.
Signature ID: 34059
Microsoft Windows MFC Library FindFile() Buffer Overflow
Threat Level: Severe
Industry ID: CVE-2007-4916
Bugtraq: 25697
Signature Description: The Microsoft Foundation Class (MFC) Library is a Microsoft library that wraps parts of the
Windows API in C++ classes. The MFC libraries contain a function called FindFile(). The FindFile() function manages
file searches across a filesystem, enabling users to specify the type of file to search.Microsoft Foundation Activex
control(MFC 8.0) is vulnerable to buffer overflow via findfile method. A remote attacker could overflow a buffer and
execute arbitrary code on the system or cause the system to crash. No remedy available as of january 2007.User can set
the kill bit for CLSID F3F381A3-4795-41FF-8190-7AA2A8102F85.
Signature ID: 34071
HTTP Apple iPhone Mobile Safari Browser DoS
Threat Level: Severe
Industry ID: CVE-2007-3944 Bugtraq: 25002
Signature Description: The Apple Safari 3 Beta before Update 3.0.3, and iPhone before 1.0.1 built-in Web browsers
are vulnerable to a heap-based buffer overflows in the Perl Compatible Regular Expressions (PCRE) library. This
vulnerability is due to insufficient validation of user supplied data. A successful exploitation of this vulnerability allow
an attacker to execute remote code on the vulnerable system. This issue is fixed. Administrators are advised to update
the latest version to resolve this issue.
Signature ID: 34073
HTTP IE Vector Markup Language Buffer Overflow (MS06-055) S
Threat Level: Severe
Industry ID: CVE-2006-4868 Bugtraq: 20096
Signature Description: Vector markup language buffer overflow vulnerability is due to a boundary error while
processing crafted VML content inside HTML documents. The vulnerable code in vgx.dll does not check bounds of the
provided string in the method attribute of the fill sub-element before copying into a buffer. Before the VML code is
processed, the string is already normalized and converted to Unicode by HTML which could change the size of the
string. The vulnerability could be exploited by attackers to inject malicious code in a web page and have it executed on
the vulnerable client system.
Signature ID: 34076
Windows Media Player ASX PlayList File Heap Overflow (MS06-078) S
Threat Level: Severe
Industry ID: CVE-2006-6134
Bugtraq: 21247
Signature Description: The Windows Media Player library WMVCORE.DLL contains a potentially exploitable heap
buffer overflow in its handling of "REF HREF" URLs within ASX files. If the URL contains an unrecognized protocol
the function will create a copy of the string in which the protocol is replaced with "mms". A heap buffer is allocated,
the string "mms" is copied into it, and then everything after and including "://" in the "REF HREF" URL is
concatenated using wcsncat.Remote attacker could overflow a buffer and cause the application to crash or execute
arbitrary code on the system with the privileges of the victim.