TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
805
Signature ID: 34519
HP Virtual Rooms client Buffer Overflow Vulnerabilities
Threat Level: Severe
Bugtraq: 27384
Signature Description: HP Virtual Rooms is a suite of online collaboration, training and support tools.HP uses an
ActiveX control to install the Virtual Rooms client. The HP Virtual Rooms Install ActiveX control(HPVirtualRooms14
ActiveX control 1.0.0.100) is vulnerable to a buffer overflow that can be exploited via AuthenticationURL() or
PortalAPIURL() or cabroot() methods. A remote attacker can create specially crafted HTML page which contain
malformed UTF-16 encoded data, that when loaded by the target user, will trigger a buffer overflow and execute
arbitrary code on the target system with the privileges of the user.No remedy available as of January 2008.
Alternatively user can set the killbit for for the vulnerable ActiveX control's CLSID 00000014-9593-4264-8B29-
930B3E4EDCCD.
Signature ID: 34520
HP Virtual Rooms client Buffer Overflow Vulnerabilities
Threat Level: Severe
Bugtraq: 27384
Signature Description: HP Virtual Rooms is a suite of online collaboration, training and support tools.HP uses an
ActiveX control to install the Virtual Rooms client. The HP Virtual Rooms Install ActiveX control(HPVirtualRooms14
ActiveX control 1.0.0.100) is vulnerable to a buffer overflow that can be exploited via AuthenticationURL() or
PortalAPIURL() or cabroot() methods. A remote attacker can create specially crafted HTML page which contain %u
encoded exploit data, that when loaded by the target user, will trigger a buffer overflow and execute arbitrary code on
the target system with the privileges of the user.No remedy available as of January 2008. Alternatively user can set the
killbit for for the vulnerable ActiveX control's CLSID corresponding to the progid
WebHPVCInstall.HPVirtualRooms14 to resolve this issue.
Signature ID: 34521
HP Virtual Rooms client Buffer Overflow Vulnerabilities
Threat Level: Severe
Bugtraq: 27384
Signature Description: HP Virtual Rooms is a suite of online collaboration, training and support tools.HP uses an
ActiveX control to install the Virtual Rooms client. The HP Virtual Rooms Install ActiveX control(HPVirtualRooms14
ActiveX control 1.0.0.100) is vulnerable to a buffer overflow that can be exploited via AuthenticationURL() or
PortalAPIURL() or cabroot() methods. A remote attacker can create specially crafted HTML page which contain hex
encoded data, that when loaded by the target user, will trigger a buffer overflow and execute arbitrary code on the
target system with the privileges of the user. No remedy available as of January 2008. Alternatively user can set the
killbit for for the vulnerable ActiveX control's CLSID corresponding to the progid
WebHPVCInstall.HPVirtualRooms14 to resolve this issue.
Signature ID: 34522
HP Virtual Rooms client Buffer Overflow Vulnerabilities
Threat Level: Warning
Bugtraq: 27384
Signature Description: HP Virtual Rooms is a suite of online collaboration, training and support tools.HP uses an
ActiveX control to install the Virtual Rooms client. The HP Virtual Rooms Install ActiveX control(HPVirtualRooms14
ActiveX control 1.0.0.100) is vulnerable to a buffer overflow that can be exploited via AuthenticationURL() or
PortalAPIURL() or cabroot() methods.A remote attacker can create specially crafted HTML page, that when loaded by
the target user, will trigger a buffer overflow and execute arbitrary code on the target system with the privileges of the