TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94
ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
971
exploit attempts will likely result in denial-of-service conditions. No remedy available as of Nov 22, 2008, user can set
killbit to the clsid {BDF3E9D2-5F7A-4F4A-A914-7498C862EA6A}corresponding to the ProgID
VSPDFEditorX.VSPDFEdit to resolve this issue.
Signature ID: 35566
Denial-of-Service of TCP-based Services in CatOS
Threat Level: Severe
Bugtraq: 8149
Signature Description: Cisco Catalyst (Cisco, Catalyst 4000, 5000, 6000 series) switches running Cisco Catalyst
Operating Software(Catos) are vulnerable to denial of service. By attempting to establish eight TCP connections using
a non-standard TCP flags combination "SP", a remote attacker can cause the stop responding to further TCP
connections to that particular service. The switch must be restarted in order for the TCP service to regain normal
functionality.
Signature ID: 35567
Denial-of-Service of TCP-based Services in CatOS
Threat Level: Severe
Bugtraq: 8149
Signature Description: Cisco Catalyst (Cisco, Catalyst 4000, 5000, 6000 series) switches running Cisco Catalyst
Operating Software(Catos) are vulnerable to denial of service. By attempting to establish eight TCP connections using
a non-standard TCP flags combination "SR", a remote attacker can cause the stop responding to further TCP
connections to that particular service. The switch must be restarted in order for the TCP service to regain normal
functionality.
Signature ID: 35568
E-vision cms add3rdparty.php module parameter Local File Inclusion vulnerability
Threat Level: Severe
Bugtraq: 32180
Signature Description: E-Vision CMS is a PHP-based content manager.e-Vision CMS is Web Content Management
System written in PHP, with MySQL database backend. It runs on Linux and Windows (with Apache). The e-Vision
CMS powered website can be designed and used with no technical background. The application is prone to multiple
local file-include vulnerabilities because it fails to properly sanitize user-supplied input to the 'module' parameter of the
/modules/3rdparty/adminpart/add3rdparty.php? script. An attacker can exploit these vulnerabilities using directory-
traversal strings to view local files and execute local scripts within the context of the webserver process. A successful
attack can allow the attacker to obtain sensitive information or gain unauthorized access to an affected computer in the
context of the vulnerable server. e-Vision CMS 2.0.2 is vulnerable, other versions may also be affected.
Signature ID: 35569
E-vision cms addpolling.php module parameter Local File Inclusion vulnerability
Threat Level: Severe
Bugtraq: 32180
Signature Description: E-Vision CMS is a PHP-based content manager. e-Vision CMS is Web Content Management
System written in PHP, with MySQL database backend. It runs on Linux and Windows (with Apache). The e-Vision
CMS powered website can be designed and used with no technical background. The application is prone to multiple
local file-include vulnerabilities because it fails to properly sanitize user-supplied input to the 'module' parameter of the
/modules/polling/adminpart/addpolling.php? script. An attacker can exploit these vulnerabilities using directory-
traversal strings to view local files and execute local scripts within the context of the webserver process. A successful
attack can allow the attacker to obtain sensitive information or gain unauthorized access to an affected computer in the
context of the vulnerable server. e-Vision CMS 2.0.2 is vulnerable, other versions may also be affected.