TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
783
Signature ID: 34218
Internet Explorer WebViewFolderIcon setSlice() Overflow vulnerability.
Threat Level: Severe
Industry ID: CVE-2006-3730
Bugtraq: 19030
Signature Description: Integer overflow in Microsoft Internet Explorer 6 on Windows XP SP2 allows remote attackers
to cause a denial of service (crash) and execute arbitrary code via a 0x7fffffff argument to the setSlice method on a
WebViewFolderIcon ActiveX object, which leads to an invalid memory copy.
Signature ID: 34264
Internet Explorer Daxctle.OCX KeyFrame Method Heap Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2006-4777 Bugtraq: 20047
Signature Description: DirectAnimation Path Control COM object (daxctle.ocx) for Internet Explorer 6.0 SP1 is
vulnerable to heap based buffer overflow via sending long arguments to the KeyFrame method. This vulnerability is
due to insufficient sanity checks on user supplied data. A successful exploitation of this vulnerability allow an attacker
to execute arbitrary commands on the vulnerable system. The vendor has issued the fixes as part of a cumulative
updated for Internet Explorer. This signature detects when an attacker try to exploit the daxctle.ocx activex control and
send characters encoded with the %uxxxx hexadecimal form.
Signature ID: 34266
Internet Explorer Daxctle.OCX KeyFrame Method Heap Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2006-4777 Bugtraq: 20047
Signature Description: DirectAnimation Path Control COM object (daxctle.ocx) for Internet Explorer 6.0 SP1 is
vulnerable to heap based buffer overflow via sending long arguments to the KeyFrame method. This vulnerability is
due to insufficient sanitization of user supplied data. A successful exploitation of this vulnerability allow an attacker to
execute arbitrary commands on the vulnerable system. The vendor has issued the fixes as part of a cumulative updated
for Internet Explorer. This signature detects when an attacker try to exploit the daxctle.ocx activex control and send
characters encoded with the %xx hexadecimal form.
Signature ID: 34268
Internet Explorer Daxctle.OCX KeyFrame Method Heap Buffer Overflow Vulnerability
Threat Level: Warning
Industry ID: CVE-2006-4777 Bugtraq: 20047
Signature Description: DirectAnimation Path Control COM object (daxctle.ocx) for Internet Explorer 6.0 SP1 is
vulnerable to heap based buffer overflow via sending long arguments to the KeyFrame method. This vulnerability is
due to insufficient sanitization of user supplied data. A successful exploitation of this vulnerability allow an attacker to
execute arbitrary commands on the vulnerable system. The vendor has issued the fixes as part of a cumulative updated
for Internet Explorer. Alternatively user can set the kill bit CLSID.
Signature ID: 34269
Internet Explorer Daxctle.OCX KeyFrame Method Heap Buffer Overflow Vulnerability
Threat Level: Warning
Industry ID: CVE-2006-4777
Bugtraq: 20047
Signature Description: DirectAnimation Path Control COM object (daxctle.ocx) for Internet Explorer 6.0 SP1 is
vulnerable to heap based buffer overflow via sending long arguments to the KeyFrame method. This vulnerability is
due to insufficient sanitization of user supplied data. A successful exploitation of this vulnerability allow an attacker to
execute arbitrary commands on the vulnerable system. The vendor has issued the fixes as part of a cumulative updated