TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
796
Signature ID: 34454
3Com Network Supervisor Directory Traversal
Threat Level: Warning
Industry ID: CVE-2005-2020 Bugtraq: 14715
Signature Description: 3Com Network Supervisor is a network monitoring application which allows monitoring
<br>services on multiple hosts. 3Com Network Supervisor (3Com Network Supervisior version 5.0.2) is a directory
traversal vulnerability. By sending a GET request containing ../ directory traversal characters on TCP port 21700, A
remote attacker can view files on the target system <br> that are located outside of the web directory.
Signature ID: 34455
PHP strip_tags() Bypass Vulnerability
Threat Level: Warning
Industry ID: CVE-2004-0595 Bugtraq: 10724
Signature Description: PHP is a widely-used general-purpose scripting language that is especially suited for Web
development and can be embedded into HTML. PHP versions 4.3.7 and earlier and PHP5 versions 5.0.0RC3 and
earlier could allow a remote attacker to inject arbitrary script tags in Microsoft Internet Explorer and Safari Web
Browsers, caused by improper handling of HTML_tags within the "strip_tag" function (e.g tags with "\0"). An attacker
could exploit this vulnerability to cross-site scripting attacks.
Signature ID: 34456
MDaemon SMTP command Buffer Overflow Vulnerability
Threat Level: Warning
Industry ID: CVE-2004-1546 Bugtraq: 11238
Signature Description: MDaemon is the one email server designed for beginners and professionals. It works skillfully
and silently while staying out of the way. MDaemon provides all of the servers , including web mail, groupware,
IMAP, POP3, and SMTP. MDaemon (MDaemon version 6.5.1) is a buffer overflow vulnerability in the SMTP server.
SMTP(Simple Mail Transport Protocol) is the network protocol used to send email across the Internet. By sending a
specially-crafted SAML command, a remote attacker could overflow the buffer and execute the arbitrary code on the
system or cause the server to crash. Upgrade the latest version and apply the available patch at the Vendor URL.
Signature ID: 34457
MDaemon SMTP command Buffer Overflow
Threat Level: Warning
Industry ID: CVE-2004-1546
Bugtraq: 11238
Signature Description: MDaemon is a multi-protocol server, developed by Alt-N Technologies, for Microsoft
Windows systems. MDaemon (MDaemon version 6.5.1) is vulnerable to a buffer overflow. By Sending a specially-
crafted an overly long SOML command to the SMTP server, a remote attacker could overflow the buffer and cause the
server to crash.
Signature ID: 34458
Computer Associates Multiple Products HTTP Request Buffer Overflow
Threat Level: Warning
Industry ID: CVE-2005-3190
Bugtraq: 15025
Signature Description: Computer Associates iGateway common component, which is included with several CA
products for UNIX/Linux/windows platforms. Computer Associates iGateway (CA, iGateway 3.0 and 4.0) are
vulnerable to a buffer overflow. By sending specially-crafted HTTP GET request to TCP port 5250 when the debug
mode is enabled, a remote attacker could overflow a buffer and execute arbitrary code on the system.