TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
87
vulnerable system. This issue is fixed in POC32 2.0 7 version. Administrators are advised to update POC32 2.0
7version or later version to resolve this issue.
Signature ID: 594
VisualRoute Web Server Detection
Threat Level: Information
Nessus: 10744
Signature Description: VisualRoute is a web based solution. VisualRoute Server provides a graphical traceroute and
ping test from this server to any other network device. This server allows attackers to perform traceroute to third party's
hosts without revealing themself to the target they are tracerouting. This rule generates an event when an attacker try to
know the VisualRoute service is runing or not.
Signature ID: 595
Xerver web server DOS
Threat Level: Information
Industry ID: CVE-2002-0448 Bugtraq: 4254 Nessus: 11015
Signature Description: Xerver is a freely available webserver. It will run on any operating system with Java installed,
including Microsoft Windows, Unix/Linux variants, MacOS. Xerver Xerver 2.10 is vulnerable to denial of service via
http request contains many "C:/" sequences. This vulnerability is fixed in Xerver Xerver 2.20. Administrators are
advised to update the Xerver Xerver 2.20 or later version to resolve this vulnerability.
Signature ID: 600
Neoteris Instant Virtual Extranet Cross Site Scripting Session Hijacking Vulnerability
Threat Level: Information
Industry ID: CVE-2003-0217 Bugtraq: 7510 Nessus: 11608
Signature Description: Neoteris Instant Virtual Extranet(IVE) is an application-based remote access solution that is
accessed via a standard web browser. Instant Virtual Extranet, version 3.01 and prior, is a cross-site scripting
vulnerability, caused by improper validation of user-supplied input. This issue triggered when an attacker is made to
access srsrv.cgi script on a web server. The successful exploitation of this allow an attacker to hijack the victim's
session. This issue is fixed in the version of IVE 3.1 or later. The administrator advice to update the latest version of
IVE 3.1 or later, which available at vendor's web site.
Signature ID: 601
WEB-CGI ikonboard.cgi access vulnerability
Threat Level: Information
Bugtraq: 7361 Nessus: 11605
Signature Description: IKonBoard is a Web Bulletin Board Service(Bulletin Board System(BBS) is a computer system
running software that allows users to connect and login to the system using a terminal program. It may be accessible
from a dial-up modem, Telnet, or the Internet) software package written in Perl. IKonBoard(Ikonboard version 3.1.1) is
prone to an arbitrary command execution vulnerability. An attacker can bypass user input validation by inserting illegal
characters into the "lang" value of a user cookie, which could allow the attacker to execute arbitrary code on the
vulnerable system. No remedy available as of September, 2008.
Signature ID: 602
WEB-CGI chipcfg.cgi access vulnerability
Threat Level: Information
Industry ID: CVE-2001-1341 Bugtraq: 2767
Signature Description: The Beck IPC@CHIP is a single chip embedded webserver. The Beck IPC@CHIP ships with a
cgi script named "ChipCfg". IPC@CHIP could allow a remote attacker to obtain sensitive network information. By