TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
827
Signature ID: 34708
EnjoySAP rfcguisink.rfcguisink.1 ActiveX Control Heap-based Buffer Overflow Vulnerability
Threat Level: Warning
Industry ID: CVE-2007-3606
Bugtraq: 24777
Signature Description: EnjoySAP, is the SAP GUI client in SAP R/3's 3-tier architecture of database, application
server and client. It is software that runs on a Microsoft Windows, Apple Macintosh or Unix desktop, and allows user
to access SAP functionality in SAP applications such as mySAP ERP and SAP Business Information Warehouse. The
EnjoySAP rfcguisink.rfcguisink.1 ActiveX control is vulnerable to a heap-based buffer overflow. The issue occurs
when processing overly long arguments (>180bytes) passed to the LaunchGui() method. By persuading the victim to
visit a specially-crafted Web page, a remote attacker could overflow a buffer and execute arbitrary code on the system
or cause the browser to crash. Upgrade to the latest version of EnjoySAP (7/19/2007 or later), available from the
EnjoySAP FTP Web site. Alternately user can set the kill bit to disable ActiveX for CLSID 7D6B5B29-FC7E-11D1-
9288-00104B885781.
Signature ID: 34709
EnjoySAP rfcguisink.rfcguisink.1 ActiveX Control Heap-based Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-3606 Bugtraq: 24777
Signature Description: EnjoySAP, is the SAP GUI client in SAP R/3's 3-tier architecture of database, application
server and client. It is software that runs on a Microsoft Windows, Apple Macintosh or Unix desktop, and allows user
to access SAP functionality in SAP applications such as mySAP ERP and SAP Business Information Warehouse. The
EnjoySAP rfcguisink.rfcguisink.1 ActiveX control is vulnerable to a heap-based buffer overflow. The issue occurs
when processing overly long arguments (>180bytes) passed to the LaunchGui() method. By persuading the victim to
visit a specially-crafted Web page having UTF-16 encoded data, a remote attacker could overflow a buffer and execute
arbitrary code on the system or cause the browser to crash. Upgrade to the latest version of EnjoySAP (7/19/2007 or
later), available from the EnjoySAP FTP Web site. Alternately user can set the kill bit to disable ActiveX for CLSID
7D6B5B29-FC7E-11D1-9288-00104B885781.
Signature ID: 34710
EnjoySAP rfcguisink.rfcguisink.1 ActiveX Control Heap-based Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-3606 Bugtraq: 24777
Signature Description: EnjoySAP, is the SAP GUI client in SAP R/3's 3-tier architecture of database, application
server and client. It is software that runs on a Microsoft Windows, Apple Macintosh or Unix desktop, and allows user
to access SAP functionality in SAP applications such as mySAP ERP and SAP Business Information Warehouse. The
EnjoySAP rfcguisink.rfcguisink.1 ActiveX control is vulnerable to a heap-based buffer overflow. The issue occurs
when processing overly long arguments (>180bytes) passed to the LaunchGui() method. By persuading the victim to
visit a specially-crafted Web page containing %u encoded exploit data, a remote attacker could overflow a buffer and
execute arbitrary code on the system or cause the browser to crash. Upgrade to the latest version of EnjoySAP
(7/19/2007 or later), available from the EnjoySAP FTP Web site. Alternately user can set the kill bit to disable ActiveX
for CLSID corresponding to the progid rfcguisink.rfcguisink.1 to resolve this issue.
Signature ID: 34711
EnjoySAP rfcguisink.rfcguisink.1 ActiveX Control Heap-based Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-3606
Bugtraq: 24777
Signature Description: EnjoySAP, is the SAP GUI client in SAP R/3's 3-tier architecture of database, application
server and client. It is software that runs on a Microsoft Windows, Apple Macintosh or Unix desktop, and allows user
to access SAP functionality in SAP applications such as mySAP ERP and SAP Business Information Warehouse. The