TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
792
trigger this buffer overflow. Upgrade to Asterisk version 1.4.3, AsteriskNOW version beta 6 and Asterisk Appliance
Developer Kit version 0.4.0 or higher to resolve this issue.
Signature ID: 34388
Asterisk SIP T.38 SDP Parsing Remote Stack Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-2293
Bugtraq: 23648
Signature Description: Asterisk is the leading open source telephony engine and tool kit. It allows a number of attached
telephones to make calls to one another, and to connect to other telephone services including the public switched
telephone network (PSTN). It will runs on Linux, NetBSD, OpenBSD, FreeBSD, Mac OS X, and Solaris. Asterisk
Asterisk 1.4.2 and prior are vulnerable to this Denial of service attack. by sending a specially crafted SIP packet with
overly long SDP parameter "T38FaxUdpEC" within the "process_sdp()" function in chan_sip.c, user can trigger this
buffer overflow. Upgrade to Asterisk version 1.4.3, AsteriskNOW version beta 6 and Asterisk Appliance Developer Kit
version 0.4.0 or higher to resolve this issue
Signature ID: 34389
SAP Message Server HTTP Get Request Handling Buffer Overflow
Threat Level: Severe
Industry ID: CVE-2007-3624 Bugtraq: 24765
Signature Description: The Message Server is a service used by the different applications servers to exchange data and
internal messages. It is also used for license checking and workload balancing together with the SAP logon utility. The
Message Server will listens on the following default TCP Ports 3600 and 8100. SAP Message Server is vulnerable to
this heap based buffer overflow attack. By sending a specially crafted GET request to /msgserver/html/group with an
overly long (around 498 bytes) string passed to the "group" parameter will cause the heap based buffer overflow.
Update to the latest version to resolve this issue.
Signature ID: 34391
Microsoft Windows Server Service Remote Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2006-3439 Bugtraq: 19409
Signature Description: Windows Server is a brand name for server operating systems released by Microsoft
Corporation. This name has been used for the following software releases, Windows 2000 Server, Windows Server
2003, 2008, 7, small Business, Essential Business and Home servers. Microsoft Windows Server Service is prone to
stack based buffer-overflow vulnerability. The vulnerability is caused due to a boundary error in the
"CanonicalizePathName()" function in netapi32.dll and can be exploited to cause a stack-based buffer overflow. A
malicious NetrpPathCanonicalize RPC request with an overly long path name to the Server Service (port 139/TCP or
445/TCP) will cause the buffer overflow. Successful exploitation allows execution of arbitrary code. Please see the
reference page MS06-040 for patch details. This rule will trigger when the flag dcerpc_service mentioned in rule 34390
is already set
Signature ID: 34392
Oracle Database Server Remote username Overflow vulnerability
Threat Level: Severe
Industry ID: CVE-2003-0095 Bugtraq: 6849
Signature Description: An Oracle database system comprises at least one instance of the application, along with data
storage. An instance comprises a set of operating-system processes and memory-structures that interact with the
storage. Oracle9i and Oracle8i Database Servers are vulnerable to a buffer overflow attack. When send an overly long
username during login time in the databse server, the authentication process fails to perform proper bounds checking