TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
939
Signature ID: 35420
Cisco OpenSSL Implementation Vulnerability
Threat Level: Warning
Industry ID: CVE-2004-0079
Bugtraq: 9899
Signature Description: Secure Sockets Layer (SSL) is a protocol used to encrypt the data transferred over a TCP
session. OpenSSL is (OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c) vulnerable to a denial of service Caused by a NULL-pointer
assignment in the "do_change_cipher_spec()" function. A remote attacker can send a specially-crafted handshake to
server that uses the OpenSSL library to cause OpenSSL to crash. This signature detects on service smtp protocol over
TLS/SSL on TCP Port 465.
Signature ID: 35421
Cisco OpenSSL Implementation Vulnerability
Threat Level: Warning
Industry ID: CVE-2004-0079 Bugtraq: 9899
Signature Description: Secure Sockets Layer (SSL) is a protocol used to encrypt the data transferred over a TCP
session. OpenSSL is (OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c) vulnerable to a denial of service Caused by a NULL-pointer
assignment in the "do_change_cipher_spec()" function. A remote attacker can send a specially-crafted handshake to
server that uses the OpenSSL library to cause OpenSSL to crash. This signature detects on service nntp protocol over
TLS/SSL on TCP Port 563.
Signature ID: 35422
Cisco OpenSSL Implementation Vulnerability
Threat Level: Warning
Industry ID: CVE-2004-0079 Bugtraq: 9899
Signature Description: Secure Sockets Layer (SSL) is a protocol used to encrypt the data transferred over a TCP
session. OpenSSL is (OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c) vulnerable to a denial of service Caused by a NULL-pointer
assignment in the "do_change_cipher_spec()" function. A remote attacker can send a specially-crafted handshake to
server that uses the OpenSSL library to cause OpenSSL to crash. This signature detects on service imap4 protocol over
TLS/SSL on TCP Port 585.
Signature ID: 35423
Cisco OpenSSL Implementation Vulnerability
Threat Level: Warning
Industry ID: CVE-2004-0079 Bugtraq: 9899
Signature Description: Secure Sockets Layer (SSL) is a protocol used to encrypt the data transferred over a TCP
session. OpenSSL is (OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c) vulnerable to a denial of service Caused by a NULL-pointer
assignment in the "do_change_cipher_spec()" function. A remote attacker can send a specially-crafted handshake to
server that uses the OpenSSL library to cause OpenSSL to crash. This signature detects on service smtp protocol over
TLS/SSL on TCP Port 587.
Signature ID: 35424
Cisco OpenSSL Implementation Vulnerability
Threat Level: Warning
Industry ID: CVE-2004-0079
Bugtraq: 9899
Signature Description: Secure Sockets Layer (SSL) is a protocol used to encrypt the data transferred over a TCP
session. OpenSSL is (OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c) vulnerable to a denial of service Caused by a NULL-pointer
assignment in the "do_change_cipher_spec()" function. A remote attacker can send a specially-crafted handshake to
server that uses the OpenSSL library to cause OpenSSL to crash. This signature detects on service SSLshell on TCP
Port 614.