TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
919
Signature ID: 35295
Black Ice 'BiAnno.ocx' Annotation SDK ActiveX Control Remote Buffer Overflow
Vulnerability
Threat Level: Severe
Industry ID: CVE-2008-2745 Bugtraq: 29635
Signature Description: The Black Ice Barcode Reading SDK/ActiveX toolkit is a robust and efficient library 2D
DataMatrix barcoding function. It is used for reading/decoding, searching barcodes, and detecting barcode orientation.
DataMatrix barcodes can store large amounts of data in a small symbol, up to a maximum 3,116 Digits or 2,335 ASCII
characters. Black Ice Annotation SDK 10.x is vulnerable to stack based buffer overflow. The vulnerability is caused
due to a boundary error in the BiAnno.ocx ActiveX control when handling specially formatted activeX method.
Successful exploitation allows execution of arbitrary code in the victim system. No remedy available as of July 6, 2008,
user can set killbit to the clsid B27DC3CE-FF81-4DCF-9B80-0E69D61BED2A to resolve this issue.
Signature ID: 35296
Novell GroupWise 'mailto' URI Handler Buffer Overflow Vulnerability
Threat Level: Severe
Industry ID: CVE-2008-2069 Bugtraq: 28969
Signature Description: GroupWise is a cross-platform collaborative software product from Novell, Inc. offering e-mail,
calendaring, instant messaging and document management. Users can synchronize e-mail, schedules, contacts, notes
and tasks between the device of their choice and GroupWise. Novell, GroupWise 7.0 is vulnerable to arbitrary code
execution vulnerability caused by improper parsing of mailto: URIs. By persuading a victim to open an HTML email
attachment containing a specially-crafted mailto: URI in an iframe SRC tag, a remote attacker could overflow a buffer
and execute arbitrary code on the system. No remedy is available as of July 6, 2008.
Signature ID: 35298
Apple Core Image Fun House Arbitrary Code Execution Vulnerability
Threat Level: Severe
Industry ID: CVE-2008-2304
Signature Description: From creating new solutions for print, photography, scientific visualization, and film post-
production to enhancing your application's user interface with innovative and effortless visual effects, Core Image
performs the heavy lifting that enables the next generation of imaging applications. Core Image Fun House Version <=
2.0 OS X is vulnerable to stack based buffer overflow. Xcode tools contain an example application called Core Image
Fun House that handles content with the ".funhouse" extension. The Funhouse application does not properly parse
XML data.. When user Opens a maliciously-crafted ".funhouse" file it may lead to an unexpected application
termination or arbitrary code execution. No patch details are available as of 11th July, 2008. Exploit attempts of this
vulnerability are detected using a combination of two signatures. This is the second signature and generates a log
message.
Signature ID: 35299
Cisco IOS FTP server remote exploit Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-2586
Bugtraq: 23885
Signature Description: Some vulnerabilities have been reported in Cisco IOS, which can be exploited by malicious
users and malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), or potentially
compromise a vulnerable system. Multiple Cisco devices running IOS could allow a remote attacker to gain
unauthorized access to the system, caused by a vulnerability regarding improper authentication by the FTP server. An
attacker could exploit this vulnerability using the IOS FTP server to gain unauthorized access to the filesystem and
possibly gain complete control of a vulnerable device. Cisco IOS ftp server Versions 12.4, 12.3, 12.2, 12.1 and 12.0 are
vulnerable to this attack. Patch details are available and please see the references for further details.