TMS zl Module IPS/IDS Signature Reference Guide RLX.10.2.2.94

ProCurve TMS zl Module IPS/IDS Signature
Reference Guide Version RLX.10.2.2.94
988
Signature ID: 35636
Data Dynamics ActiveBar Actbar3.OCX ActiveX Control Insecure Methods Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-3883 Bugtraq: 24959
Signature Description: The Data Dynamics ActiveBar delivers complete Microsoft Office and Visual Studio toolbars,
menus and dockable windows emulation in a small and easy-to-use ActiveX control. ActiveBar 3.0 removes the
limitations of system menus and toolbars and allows you to provide complete run-time customization and personalize
environments in your applications. Data Dynamics ActiveBar version 3.1 and 3.2 are vulnerable to arbitrary code
execution vulnerability. The Data Dynamics ActiveBar ActiveX control (actbar3.ocx) could allow a remote attacker to
overwrite arbitrary files on the system. By persuading a victim to visit a malicious Web site, a remote attacker could
exploit this vulnerability using the Save(), SaveLayoutChanges(), or SaveMenuUsageData() method to overwrite and
corrupt arbitrary files on the system. No remedy available as of August 2, 2008, user can set killbit to the clsid
5407153D-022F-4CD2-8BFF-465569BC5DB8 to resolve this issue. This signature detects attacks using CLSID and
Save or SaveLayoutChanges or SaveMenuUsageData method, by using some (.ini or .exe or .dll or .bat) file extesions.
Signature ID: 35637
Data Dynamics ActiveBar Actbar3.OCX ActiveX Control Insecure Methods Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-3883 Bugtraq: 24959
Signature Description: The Data Dynamics ActiveBar delivers complete Microsoft Office and Visual Studio toolbars,
menus and dockable windows emulation in a small and easy-to-use ActiveX control. ActiveBar 3.0 removes the
limitations of system menus and toolbars and allows you to provide complete run-time customization and personalize
environments in your applications. Data Dynamics ActiveBar version 3.1 and 3.2 are vulnerable to arbitrary code
execution vulnerability. The Data Dynamics ActiveBar ActiveX control (actbar3.ocx) could allow a remote attacker to
overwrite arbitrary files on the system. By persuading a victim to visit a malicious Web site, a remote attacker could
exploit this vulnerability using the Save(), SaveLayoutChanges(), or SaveMenuUsageData() method to overwrite and
corrupt arbitrary files on the system. No remedy available as of August 2, 2008, user can set killbit to the clsid
5407153D-022F-4CD2-8BFF-465569BC5DB8 to resolve this issue. This signature detects attacks using CLSID and
Save or SaveLayoutChanges or SaveMenuUsageData method, by using some (.com or .cab or .txt) file extesions.
Signature ID: 35638
Data Dynamics ActiveBar Actbar3.OCX ActiveX Control Insecure Method Vulnerability
Threat Level: Severe
Industry ID: CVE-2007-3883
Bugtraq: 24959
Signature Description: The Data Dynamics ActiveBar delivers complete Microsoft Office and Visual Studio toolbars,
menus and dockable windows emulation in a small and easy-to-use ActiveX control. ActiveBar 3.0 removes the
limitations of system menus and toolbars and allows you to provide complete run-time customization and personalize
environments in your applications. Data Dynamics ActiveBar version 3.1 and 3.2 are vulnerable to arbitrary code
execution vulnerability. The Data Dynamics ActiveBar ActiveX control (actbar3.ocx) could allow a remote attacker to
overwrite arbitrary files on the system. By persuading a victim to visit a malicious Web site containing %u encoded
data, a remote attacker could exploit this vulnerability using the Save(), SaveLayoutChanges(), or
SaveMenuUsageData() method to overwrite and corrupt arbitrary files on the system. No remedy available as of
August 2, 2008, user can set killbit to the clsid 5407153D-022F-4CD2-8BFF-465569BC5DB8 to resolve this issue.
Signature ID: 35639
HydraIRC URI Handling Buffer Overflow Vulnerability
Threat Level: Warning
Bugtraq: 30523
Signature Description: An IRC network is a collection of servers connected together. When you log onto an IRC