TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
974
conditions. No remedy available as of August 12, 2008, user can set killbit to the clsid BDF9442E-9B03-42C2-87BA-
2A459B0A5317 to resolve this issue.
Signature ID: 35577
ImageShack Toolbar ImageShackToolbar.dll ActiveX Control Insecure Method Vulnerability
Threat Level: Warning
Industry ID: CVE-2008-4549
Bugtraq: 27439
Signature Description: ImageShack Toolbar is an ActiveX control integrated into a web browser, it is used to upload
images.The vulnerability is caused due to the ImageShackToolbar.FileUploader.1 ActiveX control
(ImageShackToolbar.dll) including the insecure "BuildSlideShow()" method, identified by CLSID BDF9442E-9B03-
42C2-87BA-2A459B0A5317. This vulnerability can be exploited to upload a specific image on a user's system to the
ImageShack site or disclose contents of non-image files by using e.g. a network sniffer on a local network. The
vulnerable platform are ImageShack ImageShack Toolbar 4.5.7. By persuading a victim to visit a malicious Web page,
a remote attacker could execute arbitrary code in the context of the application using the ActiveX control (typically
Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions. No remedy available as of
August 12, 2008, user can set killbit to the clsid BDF9442E-9B03-42C2-87BA-2A459B0A5317 corresponding to the
ProgID ImageShackToolbar.FileUploader.1 to resolve this issue.
Signature ID: 35578
Microsoft Internet Explorer ADODB.Recordset Double Free Memory Exploit vulnerability
Threat Level: Warning
Industry ID: CVE-2006-7206 Bugtraq: 19227
Signature Description: ADODB.Connection ActiveX controlremote code is vulnerable to remote code execution,
which is provided as part of the ActiveX Data Objects (ADO) and that is distributed in MDAC. An attacker who
successfully exploited this vulnerability could take complete control of an affected system. The vulnerable code will
exploit "double free error" which results in double freeing of same string, rewriting of Heap Control Block by
malicious data in msado15.dll NextRecordset() function. By persuading a victim to visit a malicious Web page, a
remote attacker could execute arbitrary code in the context of the application using the ActiveX control (typically
Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions. No remedy available as of
Nov, 2008, user can set killbit to the clsid 00000535-0000-0010-8000-00AA006D2EA4 to resolve this issue.
Signature ID: 35579
Microsoft Internet Explorer ADODB.Recordset Double Free Memory Exploit vulnerability
Threat Level: Severe
Industry ID: CVE-2006-7206
Bugtraq: 19227
Signature Description: ADODB.Connection ActiveX controlremote code is vulnerable to remote code execution,
which is provided as part of the ActiveX Data Objects (ADO) and that is distributed in MDAC. An attacker who
successfully exploited this vulnerability could take complete control of an affected system. The vulnerable code will
exploit "double free error" which results in double freeing of same string, rewriting of Heap Control Block by
malicious data in msado15.dll NextRecordset() function. By persuading a victim to visit a malicious Web page which
contain hex encoded data, a remote attacker could execute arbitrary code in the context of the application using the
ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions.
No remedy available as of Nov, 2008, user can set killbit to the clsid 00000535-0000-0010-8000-00AA006D2EA4 to
resolve this issue.
Signature ID: 35580
Microsoft Internet Explorer ADODB.Recordset Double Free Memory Exploit vulnerability
Threat Level: Severe
Industry ID: CVE-2006-7206 Bugtraq: 19227