TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
844
in web pages. QTPlugin.ocx version 7.4.1 and prior is vulnerable to a stack-based buffer overflow. By persuading a
victim to visit a specially-crafted web page that passes overly long arguments to the SetBgColor(), SetHREF(),
SetMovieName(), SetTarget(), or SetMatrix() function, a remote attacker could overflow a buffer and execute arbitrary
code on the system with the privileges of the victim or cause the victim's browser to crash. No remedy is available as of
February 2008. Alternately user can disable this ActiveX by setting a kill bit. This signature detects attacks using
PROGID and method(any one of the above methods).
Signature ID: 34811
Symantec Backup Exec System Recovery Manager Unauthorized File Upload Vulnerability
Threat Level: Severe
Industry ID: CVE-2008-0457
Bugtraq: 27487
Signature Description: Symantec Backup Exec System Recovery Manager is a popular enterprise backup component.
It contains a web-based administration interface. This interface provides facilities to upload files to the server.
Symantec Backup Exec System Recovery Manager 7.0.1 and Symantec Backup Exec System Recovery Manager 7.0
are vulnerable. The file upload component fails to properly validate the paths given to it by users. A specially crafted
request would allow an attacker to upload an arbitrary file to any location on the administration server. The
administration server runs with SYSTEM privileges and this vulnerability can be leveraged to run arbitrary code with
SYSTEM privileges.
Signature ID: 34812
Ezboxx Portal System piczoom.asp XSS Vulnerability
Threat Level: Warning
Industry ID: CVE-2007-0265
Signature Description: The Ezboxx portal is powerful online community system built on the highly acclaimed
Megabbs forum software. Ezboxx enables webmasters to very easily create a dynamic and vibrant community website,
full of features and surprises for all visitors and members. In Ezboxx Portal System Beta 0.7.6 and prior versions input
passed to the "pic" parameter in /ezboxx/custom/piczoom.asp isn't properly sanitized before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected
site.
Signature ID: 34813
Ezboxx Portal System user-upload.asp XSS Vulnerability
Threat Level: Warning
Industry ID: CVE-2007-0265
Signature Description: The Ezboxx portal is powerful online community system built on the highly acclaimed
Megabbs forum software. Ezboxx enables webmasters to very easily create a dynamic and vibrant community website,
full of features and surprises for all visitors and members. In Ezboxx Portal System Beta 0.7.6 and prior versions input
passed to the "nocatname" parameter in /ezboxx/boxx/user-upload.asp isn't properly sanitized before being returned to
the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an
affected site.
Signature ID: 34814
Ezboxx Portal System newscomments.asp XSS Vulnerability
Threat Level: Warning
Industry ID: CVE-2007-0265
Signature Description: The Ezboxx portal is powerful online community system built on the highly acclaimed
Megabbs forum software. Ezboxx enables webmasters to very easily create a dynamic and vibrant community website,
full of features and surprises for all visitors and members. In Ezboxx Portal System Beta 0.7.6 and prior versions input
passed to the "iid" parameter in /ezboxx/indexes/newscomments.asp isn't properly sanitized before being returned to