TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
967
Signature ID: 35550
DjVu DjVu_ActiveX_MSOffice.dll ActiveX Component Heap Buffer Overflow vulnerability
Threat Level: Warning
Industry ID: CVE-2008-4922
Bugtraq: 31987
Signature Description: The DjVu ActiveX handles files in the DjVu digital document format. It is a new image
compression technology. DjVu allows the distribution on the Internet of very high resolution images of scanned
documents, digital documents, and photographs. DjVu allows content developers to scan high-resolution color pages of
books, magazines, catalogs, manuals, newspapers,historical or ancient documents, and make them available on the
Web. The DjVu ActiveX Control for MS Office (DjVu_ActiveX_MSOffice.dll) is vulnerable to a buffer overflow. By
persuading a victim to visit a malicious Web page, a remote attacker could overflow a buffer and execute arbitrary code
on the system with the privileges of the user or cause the victim's browser to crash. The DjVu ActiveX control version
3.0 is vulnerable, other versions may also be affected. Failed exploit attempts will likely result in denial-of-service
conditions. No remedy available as of Nov 22, 2008, user can set killbit to the clsid 4A46B8CD-F7BD-11D4-B1D8-
000102290E7C corresponding to the ProgID Djvu_Activex.Djvu_ActiveX_Control.1 to resolve this issue.
Signature ID: 35551
DjVu DjVu_ActiveX_MSOffice.dll ActiveX Component Heap Buffer Overflow vulnerability
Threat Level: Severe
Industry ID: CVE-2008-4922 Bugtraq: 31987
Signature Description: The DjVu ActiveX handles files in the DjVu digital document format. It is a new image
compression technology. DjVu allows the distribution on the Internet of very high resolution images of scanned
documents, digital documents, and photographs. DjVu allows content developers to scan high-resolution color pages of
books, magazines, catalogs, manuals, newspapers,historical or ancient documents, and make them available on the
Web. The DjVu ActiveX Control for MS Office (DjVu_ActiveX_MSOffice.dll) is vulnerable to a buffer overflow. By
persuading a victim to visit a malicious Web page which contains Hex Encoded data, a remote attacker could overflow
a buffer and execute arbitrary code on the system with the privileges of the user or cause the victim's browser to crash.
The DjVu ActiveX control version 3.0 is vulnerable, other versions may also be affected. Failed exploit attempts will
likely result in denial-of-service conditions. No remedy available as of Nov 22, 2008, user can set killbit to the clsid
4A46B8CD-F7BD-11D4-B1D8-000102290E7C corresponding to the ProgID Djvu_Activex.Djvu_ActiveX_Control.1
to resolve this issue.
Signature ID: 35552
DjVu DjVu_ActiveX_MSOffice.dll ActiveX Component Heap Buffer Overflow vulnerability
Threat Level: Severe
Industry ID: CVE-2008-4922
Bugtraq: 31987
Signature Description: The DjVu ActiveX handles files in the DjVu digital document format. It is a new image
compression technology. DjVu allows the distribution on the Internet of very high resolution images of scanned
documents, digital documents, and photographs. DjVu allows content developers to scan high-resolution color pages of
books, magazines, catalogs, manuals, newspapers,historical or ancient documents, and make them available on the
Web. The DjVu ActiveX Control for MS Office (DjVu_ActiveX_MSOffice.dll) is vulnerable to a buffer overflow. By
persuading a victim to visit a malicious Web page which contains %u Encoded data, a remote attacker could overflow a
buffer and execute arbitrary code on the system with the privileges of the user or cause the victim's browser to crash.
The DjVu ActiveX control version 3.0 is vulnerable, other versions may also be affected. Failed exploit attempts will
likely result in denial-of-service conditions. No remedy available as of Nov 22, 2008, user can set killbit to the clsid
4A46B8CD-F7BD-11D4-B1D8-000102290E7C corresponding to the progid Djvu_Activex.Djvu_ActiveX_Control.1
to resolve this issue.