Update #2780 (09/22/2016)
10 new signatures:
HIGH | HTTP:STC:ADOBE:CVE-2016-4285-CE | HTTP: Adobe Flash CVE-2016-4285 Remote Code Execution |
HIGH | HTTP:STC:ADOBE:CVE-2016-4281-CE | HTTP: Adobe Flash CVE-2016-4281 Remote Code Execution |
HIGH | HTTP:STC:ADOBE:CVE-2016-4275-CE | HTTP: Adobe Flash CVE-2016-4275 Remote Code Execution |
HIGH | HTTP:STC:ADOBE:CVE-2016-4274-CE | HTTP: Adobe Flash CVE-2016-4274 Remote Code Execution |
HIGH | HTTP:STC:ADOBE:CVE-2016-4280-CE | HTTP: Adobe Flash CVE-2016-4280 Remote Code Execution |
MEDIUM | HTTP:STC:ACTIVEX:HTML-EE-OBJ | HTTP: HTML Entity Encoded ActiveX Object Instantiation Detected |
MEDIUM | HTTP:STC:HTML-ENT-ENCD-SCRIPT | HTTP: HTML Entity Encoded Script Language Declaration Detected |
HIGH | HTTP:STC:SWF:SECURESWFLOADER | HTTP: Adobe Flash File With SecureSwfLoader Packer |
HIGH | HTTP:STC:DL:GIMP-XWD-BO1 | HTTP: GIMP XWD File Handling Stack Buffer Overflow1 |
HIGH | HTTP:STC:DL:GIMP-XWD-BO2 | HTTP: GIMP XWD File Handling Stack Buffer Overflow2 |
151 updated signatures:
HIGH | HTTP:STC:ADOBE:CVE-2015-0092-CE | HTTP: Adobe Font Driver CVE-2015-0092 Remote Code Execution |
HIGH | HTTP:STC:DL:XLS-LBL-RECORD | HTTP: Microsoft Excel Malformed Lbl record Remote Code Execution |
HIGH | HTTP:ORACLE:GLASSFISH-REST | HTTP: Oracle GlassFish Enterprise Server REST Interface Cross Site Request Forgery |
HIGH | HTTP:STC:ADOBE:THUMBNAIL-RCE1 | HTTP: Adobe Reader Thumbnail View Remote Code Execurtion1 |
HIGH | HTTP:STC:DL:WORD-DOC-BOF | HTTP: Microsoft Word Document Parsing Buffer Overflow |
MEDIUM | HTTP:STC:DL:MS-DOC-STREAM-CE1 | HTTP: Microsoft Word Document Stream Handling Code Execution1 |
HIGH | HTTP:STC:DL:APPLE-PICT | HTTP: Apple QuickDraw PICT Images ARGB Records Handling Memory Corruption |
HIGH | HTTP:STC:JAVA:TYPECONF | HTTP: Oracle Java AtomicReferenceFieldUpdater Type Confusion |
HIGH | HTTP:STC:JAVA:GSUB-BOF | HTTP: Oracle Java SE GSUB ReqFeatureIndex Buffer Overflow |
HIGH | APP:CUPS:TEXTTOPS-OF | APP: Apple CUPS Text-to-PostScript Filter Integer Overflow |
MEDIUM | HTTP:STC:JAVA:SETPIXEL-INF-DISC | HTTP: Oracle Java awt_setPixels Information Disclosure |
HIGH | HTTP:STC:ADOBE:AUD-SESSFILE | HTTP: Adobe Audition Session File Stack Buffer Overflow |
HIGH | HTTP:STC:DL:XLS-MAL-REC-MC | HTTP: Microsoft Office Excel Malformed Record Memory Corruption |
HIGH | HTTP:STC:DL:MS-FON-FILE-RCE | HTTP: Microsoft Windows Bitmap Fonts Remote Code Execution |
HIGH | HTTP:STC:JAVA:IMG-SETPIXELS-OF | HTTP: Oracle Java ImageRepresentation.setPixels Integer Overflow |
HIGH | HTTP:PHP:SDNTOJEWISH-FUNC-OF | HTTP: PHP SdnToJewish Function Integer Overflow |
HIGH | HTTP:STC:ACTIVEX:BORLAND-TCHAR1 | HTTP: Borland Silk Central Tee Chart Pro AddSeries Unsafe ActiveX Control Remote Code Execution1 |
MEDIUM | HTTP:STC:DL:DOCX-ACCESS-RCE1 | HTTP: Microsoft Word Access Violation Remote Code Execution1 |
HIGH | HTTP:STC:JAVA:IMG-INTEGER-MC | HTTP: Oracle Java java.awt.image.IntegerComponentRaster Memory Corruption |
HIGH | HTTP:RUBYONRAILS-JSONYAML-RCE | HTTP: Ruby on Rails JSON YAML Parsing Remote Code Execution |
MEDIUM | HTTP:MS-WINDOWS-X509-DOS | HTTP: Microsoft Windows X.509 Certificate Validation Denial of Service |
HIGH | HTTP:STC:DL:WORD-FILE-MEM | HTTP: Microsoft Office Multiple File Handling Memory Corruption |
MEDIUM | CHAT:AIM:OVERFLOW:AIM-HTTP-AWAY | CHAT: AOL Instant Messenger Away Message Remote Buffer Overflow |
HIGH | HTTP:STC:DL:PPT-SHAPES-MEM | HTTP: Microsoft PowerPoint Drawing Shapes Handling Memory Corruption |
HIGH | HTTP:STC:DL:XL-CVE-2013-1315 | HTTP: Microsoft Excel CVE-2013-1315 Memory Corruption |
HIGH | HTTP:STC:JAVA:GSUB-TABLE-BO | HTTP: Oracle Java SE GSUB FeatureCount Buffer Overflow |
HIGH | APP:WINAMP:MIDI-FILE-OF | APP: Nullsoft Winamp MIDI File Buffer Overflow |
HIGH | HTTP:PHP:PHAR_SET_INODE-FUNC-BO | HTTP: PHP Phar_set_inode Function Buffer Overflow |
MEDIUM | HTTP:STC:DIRECTSHOW-AVI-EXEC1 | HTTP: Microsoft Windows DirectShow AVI File Code Execution1 |
HIGH | HTTP:STC:DL:CISCO-WEBEX-ATDL | HTTP: Cisco WebEx Player ATDL2006.dll Heap Memory Corruption |
HIGH | HTTP:PHP:VS-NEWS-RFI1 | HTTP: VirtualSystem VS-News-System Show_News_Inc.PHP Remote File Inclusion1 |
HIGH | HTTP:STC:IE:SETCAPTURE-UAF1 | HTTP: Microsoft Internet Explorer SetCapture Use After Free1 |
HIGH | HTTP:STC:IE:TIF-DND1 | HTTP: Internet Explorer TIF Drag and Drop Vulnerability1 |
HIGH | HTTP:STC:JAVA:JAX-WS-RCE | HTTP: Oracle Java Applet JAX-WS Class Handling Arbitrary Code Execution |
HIGH | HTTP:STC:ADOBE:CVE-2014-0493-C1 | HTTP: Adobe Acrobat and Reader CVE-2014-0493 Remote Code Execution1 |
HIGH | HTTP:STC:IE-STREAM-HDR | HTTP: Internet Explorer Stream Header |
HIGH | HTTP:STC:SCRIPT:GARBLE-JS-OBFU1 | HTTP: Garble Javascript Obfuscation Detected1 |
HIGH | HTTP:STC:CHROME:JS-MSGBOX-DOS1 | HTTP: Google Chrome Java Script Message Box Denial of Service1 |
HIGH | HTTP:STC:ADOBE:CVE-2015-5576-C1 | HTTP: Adobe Exe CVE-2015-5576 Remote Code Execution1 |
HIGH | HTTP:STC:JAVA:SHORT-COMPONENT | HTTP: Oracle Java Runtime Environment ShortComponentRaster.verify Memory Corruption |
HIGH | HTTP:STC:DL:GIMP-XWD-BO | HTTP: GIMP XWD File Handling Stack Buffer Overflow |
MEDIUM | HTTP:STC:GIT-CLIENT-CE | HTTP: GitHub Git Tree Handling Overwrite Arbitrary Command Execution |
HIGH | HTTP:STC:IE:OBJECT-TAG-XML1 | HTTP: Microsoft Internet Explorer Object Tag XML RCE1 |
HIGH | HTTP:STC:SWF:OPENTYPE-FONT-OF1 | HTTP: Adobe Flash Player OpenType Font Parsing Integer Overflow1 |
HIGH | HTTP:STC:IE:IESTYLE-OBJ | HTTP: Microsoft Internet Explorer Style Object Remote Code Execution |
HIGH | HTTP:ORACLE:JNLP-CODE-EXEC | HTTP: Oracle Sun Java JRE Arbitrary Code Execution |
MEDIUM | HTTP:STC:STREAM:DIRECTSHOW-MJP1 | HTTP: Microsoft Windows MJPEG Media Decompression Code Execution1 |
MEDIUM | HTTP:STC:JAVA:PRVDR-SKLTON-SB1 | HTTP: Oracle Java ProviderSkeleton Sandbox Bypass1 |
HIGH | HTTP:STC:DL:OO-EMF | HTTP: OpenOffice EMF File EMR_BITBLT Record Integer Overflow |
HIGH | HTTP:STC:DL:MSPUBLISHER-OBJ | HTTP: Microsoft Publisher Object Handler Validation Code Execution |
MEDIUM | HTTP:STC:IMG:OFFICE-FLASHPIX21 | HTTP: Microsoft Office Malicious FlashPix Image (2)1 |
MEDIUM | HTTP:STC:ADOBE:READER-INFO-DISC | HTTP: Adobe Reader Information Disclosure |
MEDIUM | HTTP:STC:IMG:JPEG:WIN-COLOR1 | HTTP: Microsoft Windows Color Management Module Buffer Overflow1 |
MEDIUM | HTTP:STC:IMG:ICO-SIZE-OF1 | HTTP: Overlarge ICO Size Parameter1 |
HIGH | HTTP:STC:DL:EXESCOPE-FILE-BO | HTTP: eXeScope Input File processing Buffer Overflow |
MEDIUM | HTTP:STC:IE:URL-FILE-BOF1 | HTTP: Microsoft Windows Explorer Invalid URL File1 |
HIGH | HTTP:STC:ADOBE:READER-U3D | HTTP: Adobe Reader U3D ShadingModifierBlock Remote Code Execution |
MEDIUM | HTTP:STC:DL:WORD-MEM-CORR1 | HTTP: Microsoft Word Documents Memory Corruption1 |
HIGH | HTTP:STC:SWF:SHARED-OBJ-UAF | HTTP: Adobe Flash Player SharedObject Use After Free |
MEDIUM | HTTP:STC:DL:VLC-MEDIA-PLY-BO1 | HTTP: VideoLAN VLC Media Player File Buffer Overflow1 |
MEDIUM | HTTP:STC:DL:VISIO-VSD-MEM1 | HTTP: Microsoft Visio VSD File Format Memory Corruption Remote Code Execution1 |
MEDIUM | HTTP:STC:DL:VISIO-OBJ-CONFUSIO1 | HTTP: Microsoft Visio Object Type Confusion Remote Code Execution1 |
MEDIUM | HTTP:STC:DL:REAL-SWF-BOF1 | HTTP: RealPlayer SWF Flash File Buffer Overflow1 |
HIGH | HTTP:STC:DL:QUO-ESIGNAL-BOF | HTTP: Interactive Data eSignal Stack Buffer Overflow |
HIGH | HTTP:STC:DL:MAL-MIC-BICLRUSED | HTTP: Windows Graphics Rendering Engine MIC File Malformed biClrUsed Parameter |
HIGH | HTTP:STC:ADOBE:PDF-FREETYPE | HTTP: PDF FreeType Compact Font Format Multiple Overflow |
MEDIUM | HTTP:STC:DL:QT-FPX-IO1 | HTTP: Apple QuickTime FPX File Integer Overflow1 |
HIGH | HTTP:STC:DL:XLS-WOPT | HTTP: Microsoft Office Excel WOPT Record Memory Corruption |
HIGH | HTTP:STC:DL:MSOFFICE-MSO-RCE | HTTP: Microsoft Office MSO.dll Remote Code Execution |
HIGH | HTTP:STC:DL:MAL-WRI | HTTP: Microsoft WordPad Malicious File |
HIGH | HTTP:STC:IE:CVE-2014-1804-UAF | HTTP: Microsoft Internet Explorer CVE-2014-1804 Use-After-Free |
HIGH | HTTP:STC:DL:MS-WORD-BULLET | HTTP: Microsoft Word Bulleted List Handling Memory Corruption |
MEDIUM | HTTP:STC:DL:OFFICE-PICT-MC1 | HTTP: Microsoft Office PICT Filter Invalid Length Memory Corruption1 |
MEDIUM | HTTP:STC:DL:OFFICE-MAL-PUB1 | HTTP: Malformed Microsoft Office Publisher File1 |
MEDIUM | HTTP:STC:DL:MS-PP-PRESENT-RCE1 | HTTP: Microsoft PowerPoint Presentation Handling Remote Code Execution1 |
HIGH | HTTP:STC:DL:MS-OPEN-FONT-FILE | HTTP: Microsoft Windows OpenType Font File Remote Code Execution |
MEDIUM | HTTP:STC:DL:MS-OBJ-PACKAGER-RC1 | HTTP: Microsoft Windows Object Packager ClickOnce Object Handling Code Execution1 |
HIGH | HTTP:STC:DL:XLS-MAL-OBJ | HTTP: Microsoft Office Excel Malformed Object Record Parsing Code Execution |
HIGH | HTTP:STC:DL:XNVIEW-PCT-FILE-BOF | HTTP: XnView PCT File Processing Buffer Overflow |
MEDIUM | HTTP:STC:DL:MAL-MPEG-41 | HTTP: Malformed MPEG-4 Video File1 |
HIGH | HTTP:STC:DL:XLS-PIC-REC-MC | HTTP: Microsoft Office Excel Crafted Picture Record Code Execution |
MEDIUM | HTTP:STC:DL:LIBXML2-ENTRY-NAME1 | HTTP: libxml2 XML File Processing Long Entity Name Buffer Overflow1 |
MEDIUM | HTTP:STC:SCRIPT:JS-ARRAY-POST | HTTP: Heuristics PHP Array POST Obfuscation |
MEDIUM | HTTP:STC:DL:EMF-EMR-INT1 | HTTP: OpenOffice EMF File EMR Record Parsing Integer Overflow1 |
HIGH | HTTP:STC:DL:XLS-BIN-OF | HTTP: Microsoft Office Excel Binary Format Parsing Integer Overflow |
MEDIUM | HTTP:MISC:AV-INVALID-CHKSUM1 | HTTP: Multiple AV Vendor Invalid Archive Checksum Bypass1 |
HIGH | HTTP:STC:DL:WORD-SMART-TAGS | HTTP: Microsoft Word Smart Tags Code Execution |
MEDIUM | HTTP:STC:DL:ASF-DF1 | HTTP: ASF Header Parsing Invalid Free1 |
HIGH | HTTP:STC:JAVA:IBM-CLASS-RCE | HTTP: IBM Java package java.lang.class Remote Code Execution |
MEDIUM | HTTP:STC:DL:APPLE-QT-IMAGE-MC1 | HTTP: Apple QuickTime Image Description Atom Sign Extension Memory Corruption1 |
HIGH | HTTP:STC:DOTNET-WINFORMS-RCE | HTTP: Microsoft .NET Framework WinForms Remote Code Execution |
MEDIUM | HTTP:STC:DL:APPLE-QT-FLIC-BO1 | HTTP: Apple QuickTime FLIC Animation File Buffer Overflow1 |
HIGH | HTTP:STC:DL:MS-MEDIA-DVR | HTTP: Microsoft Windows Media DVR-MS File Memory Corruption |
MEDIUM | HTTP:STC:ACTIVEX:MSCOMCTL-OCX1 | HTTP: Microsoft Windows Common Control 'MSCOMCTL.OCX' Unsafe ActiveX Control1 |
MEDIUM | HTTP:STC:ACTIVEX:MS-AGENT-LIB1 | HTTP: Microsoft Agent Unsafe ActiveX Control1 |
HIGH | HTTP:STC:DL:XLS-FILTER-REC | HTTP: Microsoft Excel Malformed Filter Records Handling Code Execution |
MEDIUM | HTTP:STC:IE:MAL-JPEG1 | HTTP: Microsoft Internet Explorer Malformed JPEG File1 |
HIGH | HTTP:STC:ADOBE:ACROBAT-GETICON | HTTP: Adobe Acrobat JavaScript getIcon Method Buffer Overflow |
MEDIUM | HTTP:STC:DL:XLS-SERIES-TYPE-RC1 | HTTP: Microsoft Excel Series Record Parsing Type Mismatch Remote Code Execution1 |
MEDIUM | HTTP:STC:DL:XLS-RTWINDOW1 | HTTP: Microsoft Excel rtWindow1 Record Handling Code Execution1 |
HIGH | HTTP:STC:ADOBE:U3D-CLODMESH-MC | HTTP: Adobe Acrobat Reader U3D CLODMeshDeclaration Memory Corruption |
MEDIUM | HTTP:STC:DL:XLS-INT-OR1 | HTTP: Microsoft Excel Integer Overrun Vulnerability1 |
MEDIUM | HTTP:STC:DL:MSSQL-BACKUP-MEM | HTTP: Microsoft SQL Server Backup Restoring Memory Corruption |
HIGH | HTTP:STC:IMG:JAVA-GIF-MEM | HTTP: Sun Java Runtime Environment GIF Parsing Memory Corruption |
HIGH | APP:ORACLE:SYSTEM-ARRAYCOPY-RCE | APP: Oracle Java System.arraycopy Race Condition |
MEDIUM | HTTP:STC:ADOBE:SWF-ACTIONSCRIPT | HTTP: Adobe Flash Player ActionScript Function Variable Arguments Information Disclosure |
HIGH | APP:ORACLE:RHINOSCRIPT-BYPASS | APP: Oracle Java Applet Rhino Script Engine Policy Bypass |
HIGH | HTTP:STC:JAVA:JNDI-BYPASS | HTTP: Oracle Java JNDI Sandbox Bypass |
MEDIUM | HTTP:STC:ADOBE:U3D-TEXTURE-BOF1 | HTTP: Adobe Acrobat Reader U3D Texture Parsing Buffer Overflow1 |
HIGH | HTTP:STC:ADOBE:CAM-RAW-PLUGIN | HTTP: Adobe Camera Raw Plug-in TIFF Image Processing Buffer Underflow |
HIGH | HTTP:STC:ADOBE:READER-BMP | HTTP: Adobe Acrobat and Reader PDF BMP Image Memory Corruption |
HIGH | HTTP:STC:ADOBE:CVE-2013-3357-MC | HTTP: Adobe Reader CVE-2013-3357 Memory Corruption |
HIGH | HTTP:STC:SWF:CVE-2013-3362-MC | HTTP: Adobe FlashPlayer CVE-2013-3362 Memory Corruption |
HIGH | HTTP:STC:DL:OTF-BO | HTTP: Microsoft Windows Embedded OpenType Font Buffer Overflow |
HIGH | HTTP:STC:CLAMAV-UPX-DECODE-DOS | HTTP: ClamAV UPX File Handling Denial of Service |
HIGH | HTTP:STC:DL:WINVERIFY-TRUST | HTTP: Microsoft Windows WinVerifyTrust Signature Validation Vulnerability |
MEDIUM | HTTP:STC:JAVA:NXT-UPDTE-RA | HTTP: Oracle Java SE OCSP nextUpdate Replay Attack |
HIGH | HTTP:STC:MS-CVE-2014-4121-RCE | HTTP: Microsoft .NET Framework CVE-2014-4121 Remote Code Execution |
HIGH | HTTP:MANAGENGINE-EVENTLOG-CSRF | HTTP: ManageEngine EventLog Analyzer Cross Site Request Forgery |
HIGH | HTTP:STC:DL:MS-PUB-MC | HTTP: Microsoft Publisher PUB File Processing Memory Corruption |
HIGH | HTTP:STC:ADOBE:SWF-XLS-MALF | HTTP: Adobe Flash Player Malformed XLS File Corruption Remote Code Execution |
HIGH | HTTP:STC:DL:XLS-SXDB | HTTP: Microsoft Office Excel SXDB Memory Corruption |
HIGH | HTTP:MS-WORDPERFECT-BOF | HTTP: Microsoft WordPerfect Length Field Parsing Buffer Overflow |
HIGH | HTTP:STC:DL:XLS-INDEX | HTTP: Microsoft Office Excel Index Parsing Code Execution |
HIGH | HTTP:STC:DL:VISIO-FREED | HTTP: Microsoft Visio Freed Object Remote Code Execution |
HIGH | HTTP:STC:SILVERLIGHT-MEM-COR | HTTP: Microsoft Silverlight Pointer Dereference Memory Corruption |
MEDIUM | HTTP:STC:IMG:MALFORMED-EMF-TAG1 | HTTP: Malformed EMF Tag1 |
MEDIUM | HTTP:MISC:WAPP-PARAM-SEC1 | HTTP: Multiple Web Application Parameter Tampering 1 |
HIGH | HTTP:STC:GOOGLE-SKETCHUP-PICT | HTTP: Google SketchUp PICT File Buffer Overflow |
HIGH | HTTP:BROWSER-WINDOW-INJECTION | HTTP: Multiple Web Browsers Window Injection |
HIGH | HTTP:STC:ADOBE:PHOTOSHOP-CS5-MC | HTTP: Adobe Photoshop CS5 GIF File Heap Corruption |
HIGH | HTTP:STC:DL:CRYSTAL-RPT-OLE | HTTP: Microsoft Visual Studio Crystal Reports RPT File Handling Code Execution |
HIGH | HTTP:STC:DL:XLS-VBOBJ-RCE | HTTP: Microsoft Excel VisualBasic Object Validation Code Execution |
HIGH | HTTP:STC:DL:RTF-MISMATCH | HTTP: Microsoft Word RTF Mismatch Remote Code Execution |
HIGH | HTTP:STC:JAVA:JMXMBEAN-RCE | HTTP: Oracle Java JmxMBeanServer Package Sandbox Breach |
HIGH | HTTP:STC:DL:MS-WIN-VERIFY-TRUST | HTTP: Microsoft Windows WinVerifyTrust Signature Validation |
HIGH | HTTP:STC:DL:XLS-FNGROUPNAME | HTTP: Microsoft Office Excel FNGROUPNAME Record Memory Corruption |
HIGH | HTTP:STC:DL:XORG-PCF-BO | HTTP: X.Org X Server PCF Font Parser Buffer Overflow |
MEDIUM | APP:CA:ARCSRV:GWT-INFO-DISC | APP: CA ARCserve D2D GWT RPC Request Credentials Disclosure |
HIGH | HTTP:STC:DL:IRFANVIEW-MC | HTTP: IrfanView FlashPix Plug-in Memory Corruption |
HIGH | APP:CAIN-ABEL-CISCO-IOS-BOF | APP: Cain & Abel Cisco IOS Configuration File Buffer Overflow |
HIGH | HTTP:STC:ADOBE:CVE-2014-0534-SB | HTTP: Adobe Flash Player CVE-2014-0534 Security Bypass |
HIGH | HTTP:STC:DL:MS-CRFTD-RTF-DOC-MC | HTTP: Microsoft Office Crafted RTF Document Handling Memory Corruption |
HIGH | HTTP:STC:ADOBE:CVE-2015-3122-C1 | HTTP: Adobe Flash CVE-2015-3122 Remote Code Execution1 |
HIGH | HTTP:PHP:PHP-QUOT-PRINT-ENCODE | HTTP: PHP php_quot_print_encode Heap Buffer Overflow |
HIGH | HTTP:STC:APPLE-QTIME-DREF-BO | HTTP: Apple QuickTime Alis Volume Name Parsing Stack Buffer Overflow |
HIGH | APP:CUPS:GIF-READ-LZW-OF | APP: Apple CUPS gif_read_lzw Heap Buffer Overflow |
HIGH | HTTP:STC:DL:DOT-NET-WEB-PROXY | HTTP: Microsoft .NET Web Proxy Auto Discovery Vulnerability |
HIGH | HTTP:STC:DL:FREETYPE-TYPE1 | HTTP: FreeType PostScript Type1 Font Parsing Code Execution |
HIGH | HTTP:STC:MS-WORD-INDEX-MC | HTTP: Microsoft Office Bad Index Memory Corruption |
MEDIUM | HTTP:STC:DL:MS-OFFICE-PICT-MC1 | HTTP: Microsoft Office PICT Filter Map Structure Memory Corruption1 |
Details of the signatures included within this bulletin:
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Font Driver. A successful exploit can lead to remote code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- microsoft windows_rt_8.1 -
- microsoft windows_rt -
- microsoft windows_8 -
- microsoft windows_8.1 -
- microsoft windows_server_2008 r2
- microsoft windows_vista
- microsoft windows_server_2012 -
- microsoft windows_server_2003
- microsoft windows_7 -
- microsoft windows_server_2008 -
- microsoft windows_server_2012 r2
HTTP:STC:DL:XLS-LBL-RECORD - HTTP: Microsoft Excel Malformed Lbl record Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known issue with Microsoft Excel. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Excel 2003 SP1
- Microsoft Office Compatibility Pack 2007 SP2
- Microsoft Office Compatibility Pack 2007 SP1
- Microsoft Office 2008 for Mac
- Microsoft Office Compatibility Pack 2007
- Microsoft Excel 2007 SP1
- Microsoft Excel 2003 SP2
- Microsoft Excel 2003 SP3
- Microsoft Open Xml File Format Converter Mac
- Microsoft Excel 2007 SP2
- Microsoft Office 2004 for Mac
- Microsoft Excel Viewer SP2
- Microsoft Excel 2007
- Microsoft Excel 2003
HTTP:ORACLE:GLASSFISH-REST - HTTP: Oracle GlassFish Enterprise Server REST Interface Cross Site Request Forgery
Severity: HIGH
Description:
This signature detects Web pages containing dangerous cross site requests. A malicious Web site can exploit a known vulnerability in Oracle GlassFish REST interface and upload arbitrary WAR files which will be executed on the target server.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- Oracle Glassfish Server 3.1.1
HTTP:STC:ADOBE:THUMBNAIL-RCE1 - HTTP: Adobe Reader Thumbnail View Remote Code Execurtion1
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Reader. A successful attack can lead to arbitrary code execution in the context of the application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
HTTP:STC:DL:WORD-DOC-BOF - HTTP: Microsoft Word Document Parsing Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Microsoft Word Document. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- microsoft word 2002 (sp3)
HTTP:STC:DL:XLS-FILTER-REC - HTTP: Microsoft Excel Malformed Filter Records Handling Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Excel. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Excel 2000 SP3
- Microsoft Excel 2004 for Mac
- Microsoft Excel 2003 SP1
- Microsoft Excel 2002 SP3
- Microsoft Excel 2000
- Microsoft Excel 2002
- Microsoft Excel 2000 SR1
- Avaya Customer Interaction Express (CIE) User Interface 1.0
- Microsoft Excel 2003 SP3
- Microsoft Excel 2000 SP2
- Microsoft Excel 2003 SP2
- Microsoft Excel 2002 SP1
- Microsoft Excel 2002 SP2
- Microsoft Office Excel Viewer 2003
- Microsoft Excel 2003
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in XnView PCT File. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the process's user.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- xnview 1.92.1
- xnview 1.97.1
- xnview 1.99
- xnview 1.05 (c)
- xnview 1.25 (a)
- xnview 1.07
- xnview 1.97.7
- xnview 1.82
- xnview 1.82.2
- xnview 1.98.8
- xnview 1.97.5
- xnview 1.50.1
- xnview 1.68.1
- xnview 1.60
- xnview 1.80
- xnview 1.82.4
- xnview 1.03
- xnview 1.18.1
- xnview 1.01
- xnview 1.91
- xnview 1.93
- xnview 1.10
- xnview 1.66
- xnview 1.98.1
- xnview 1.93.3
- xnview 1.95
- xnview 1.95.2
- xnview 1.12
- xnview 1.68
- xnview 1.93.1
- xnview 1.98.2
- xnview 1.91.5
- xnview 1.97
- xnview 1.95.4
- xnview 1.14
- xnview 1.09
- xnview 1.98.4
- xnview 1.16
- xnview 1.23
- xnview 1.91.1
- xnview 1.18
- xnview up to 2.03
- xnview 1.91.3
- xnview 1.96.2
- xnview 1.36
- xnview 1.34
- xnview 1.70.3
- xnview 1.32
- xnview 1.80.2
- xnview 1.30
- xnview 1.21
- xnview 1.97.8
- xnview 1.41
- xnview 1.94.1
- xnview 1.0 (a)
- xnview 1.98.5
- xnview 1.50
- xnview 1.97.2
- xnview 1.98
- xnview 1.45
- xnview 1.82.3
- xnview 1.06
- xnview 1.97.6
- xnview 1.61
- xnview 1.98.6
- xnview 1.04
- xnview 1.97.4
- xnview 1.02
- xnview 1.90
- xnview 1.65
- xnview 1.93.6
- xnview 1.92
- xnview 1.95.1
- xnview 1.67
- xnview 1.93.4
- xnview 1.94
- xnview 1.95.3
- xnview 1.11
- xnview 1.93.2
- xnview 1.24
- xnview 1.96
- xnview 1.13
- xnview 1.98.3
- xnview 1.70
- xnview 1.91.4
- xnview 1.15
- xnview 1.08
- xnview 1.20
- xnview 1.91.6
- xnview 1.90.1
- xnview 1.98.7
- xnview 1.74
- xnview 1.96.5
- xnview 1.19
- xnview 1.90.3
- xnview 1.91.2
- xnview 1.17 (a)
- xnview 1.37
- xnview 1.70.2
- xnview 1.96.1
- xnview 1.35
- xnview 1.80.3
- xnview 1.33
- xnview 1.99.1
- xnview 1.80.1
- xnview 1.31
- xnview 1.05 (b)
- xnview 1.70.4
- xnview 1.55
- xnview 1.40
- xnview 1.94.2
- xnview 1.97.3
- xnview 1.46
- xnview 1.22
HTTP:STC:DL:APPLE-PICT - HTTP: Apple QuickDraw PICT Images ARGB Records Handling Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Apple Quickdraw. An attacker can create a malicious Web page containing dangerous PICT images; when opened by a victim, the attacker can cause a denial-of-service condition with the possibility of remote code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Apple Mac OS X 10.4.8
- Apple Mac OS X Server 10.4.8
HTTP:STC:JAVA:TYPECONF - HTTP: Oracle Java AtomicReferenceFieldUpdater Type Confusion
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Oracle Java. The vulnerability is due to a type confusion flaw in AtomicReferenceFieldUpdater class. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to visit a webpage containing a maliciously crafted Java applet. Successful exploitation could result in arbitrary code execution in the context of the currently logged-in user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- oracle jdk 1.5.0
- oracle jdk 1.7.0
- oracle jre 1.5.0
- oracle jre 1.7.0
- oracle jdk 1.8.0
- oracle jre 1.8.0
- oracle jre 1.6.0
- oracle jdk 1.6.0
HTTP:STC:JAVA:GSUB-BOF - HTTP: Oracle Java SE GSUB ReqFeatureIndex Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Oracle Java. The vulnerability is due to invalid processing of the ReqFeatureIndex entry in the GSUB table. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to visit a webpage containing a maliciously crafted Java applet. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- oracle jdk 1.7.0 (update_45)
- oracle jre 1.5.0 (update_55)
- oracle jdk 1.5.0 (update_55)
- oracle jre 1.6.0 (update_65)
- oracle jdk 1.6.0 (update_65)
- oracle jrockit r27.7.7
- oracle jrockit r28.2.9
- oracle jre 1.7.0 (update_45)
APP:CUPS:TEXTTOPS-OF - APP: Apple CUPS Text-to-PostScript Filter Integer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Apple CUPS Text-to-PostScript texttops Filter. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Avaya Proactive Contact 4.0
- Avaya Messaging Storage Server 1.0
- Avaya Messaging Storage Server 2.0
- Avaya Messaging Storage Server
- Avaya Message Networking
- Sun OpenSolaris Build Snv 99
- Red Hat Enterprise Linux Desktop 5 Client
- Easy Software Products CUPS 1.1.17
- Ubuntu Ubuntu Linux 6.06 LTS Powerpc
- Ubuntu Ubuntu Linux 6.06 LTS I386
- Ubuntu Ubuntu Linux 6.06 LTS Amd64
- Easy Software Products CUPS 1.2.8
- Easy Software Products CUPS 1.3.2
- SuSE Novell Linux POS 9
- Sun OpenSolaris Build Snv 101A
- Easy Software Products CUPS 1.1.19
- Sun OpenSolaris Build Snv 91
- Debian Linux 4.0 Arm
- Ubuntu Ubuntu Linux 8.04 LTS Amd64
- Ubuntu Ubuntu Linux 8.04 LTS I386
- Ubuntu Ubuntu Linux 8.04 LTS Lpia
- Ubuntu Ubuntu Linux 8.04 LTS Powerpc
- Ubuntu Ubuntu Linux 8.04 LTS Sparc
- Red Hat Desktop 3.0.0
- Ubuntu Ubuntu Linux 7.10 Lpia
- Easy Software Products CUPS 1.1.22
- Easy Software Products CUPS 1.1.23
- Gentoo Linux
- Turbolinux Turbolinux Server 10.0.0 X64
- SuSE openSUSE 10.3
- Easy Software Products CUPS 1.1.19 Rc5
- Easy Software Products CUPS 1.3.3
- Red Hat Desktop 4.0.0
- Easy Software Products CUPS 1.1.12
- Easy Software Products CUPS 1.1.15
- Easy Software Products CUPS 1.1.14
- Turbolinux wizpy
- Easy Software Products CUPS 1.1.18
- Mandriva Corporate Server 4.0.0 X86 64
- rPath Appliance Platform Linux Service 1
- Easy Software Products CUPS 1.2.2
- Slackware Linux 12.1
- SuSE Open-Enterprise-Server
- Easy Software Products CUPS 1.3.6
- SuSE openSUSE 11.0
- Sun OpenSolaris Build Snv 92
- Easy Software Products CUPS 1.1.13
- Turbolinux Multimedia
- Turbolinux Personal
- Easy Software Products CUPS 1.1.16
- Easy Software Products CUPS 1.2.4
- Easy Software Products CUPS 1.1.23 Rc1
- Mandriva Linux Mandrake 2008.0
- Mandriva Linux Mandrake 2008.0 X86 64
- Sun OpenSolaris Build Snv 90
- Turbolinux Appliance Server 2.0
- Turbolinux Appliance Server 3.0
- Turbolinux Appliance Server 3.0 X64
- Easy Software Products CUPS 1.1.4 -2
- Ubuntu Ubuntu Linux 7.10 I386
- Turbolinux Appliance Server Hosting Edition 1.0.0
- Turbolinux Appliance Server Workgroup Edition 1.0.0
- Debian Linux 4.0 Amd64
- Easy Software Products CUPS 1.1.10
- Easy Software Products CUPS 1.1.7
- Avaya Intuity AUDIX LX 2.0
- Easy Software Products CUPS 1.1.6
- Easy Software Products CUPS 1.0.4 -8
- Easy Software Products CUPS 1.1.22 Rc1
- Easy Software Products CUPS 1.0.4
- Debian Linux 4.0 Ia-64
- Mandriva Linux Mandrake 2008.1 X86 64
- Pardus Linux 2008
- Easy Software Products CUPS 1.1.1
- Turbolinux Appliance Server 1.0.0 Workgroup Edition
- Ubuntu Ubuntu Linux 7.10 Powerpc
- Easy Software Products CUPS 1.1.4
- Mandriva Linux Mandrake 2007.1
- Sun OpenSolaris Build Snv 101
- Sun OpenSolaris Build Snv 100
- Easy Software Products CUPS 1.1.20
- Avaya Messaging Storage Server 3.1
- Avaya Message Networking 3.1
- Ubuntu Ubuntu Linux 7.10 Sparc
- Red Hat Enterprise Linux AS 3
- Red Hat Enterprise Linux ES 3
- Red Hat Enterprise Linux WS 3
- rPath rPath Linux 1
- Easy Software Products CUPS 1.2.10
- Easy Software Products CUPS 1.2.9
- Sun OpenSolaris Build Snv 93
- Sun OpenSolaris Build Snv 94
- Mandriva Linux Mandrake 2009.0
- Mandriva Linux Mandrake 2009.0 X86 64
- Mandriva Linux Mandrake 2008.1
- Mandriva Corporate Server 4.0
- Sun OpenSolaris Build Snv 88
- Sun OpenSolaris Build Snv 89
- Red Hat Enterprise Linux Desktop Workstation 5 Client
- Red Hat Enterprise Linux 5 Server
- Sun OpenSolaris Build Snv 95
- Ubuntu Ubuntu Linux 7.04 Amd64
- Sun OpenSolaris Build Snv 87
- Ubuntu Ubuntu Linux 7.04 Powerpc
- Ubuntu Ubuntu Linux 7.04 Sparc
- SuSE Novell Linux Desktop 9.0.0
- Mandriva Corporate Server 3.0.0
- Red Hat Fedora 8
- rPath rPath Linux 2
- Easy Software Products CUPS 1.3.7
- SuSE openSUSE 10.2
- Easy Software Products CUPS 1.2.12
- Turbolinux Turbolinux Server 11 X64
- Turbolinux Turbolinux Server 11
- Sun OpenSolaris Build Snv 96
- Easy Software Products CUPS 1.1.21
- Turbolinux Client 2008
- Ubuntu Ubuntu Linux 7.10 Amd64
- Debian Linux 4.0 Alpha
- Easy Software Products CUPS 1.1.4 -5
- Easy Software Products CUPS 1.1.4 -3
- Debian Linux 4.0 Hppa
- Debian Linux 4.0 Ia-32
- SuSE SUSE Linux Enterprise Server 8
- Debian Linux 4.0 M68k
- Debian Linux 4.0 Mips
- Debian Linux 4.0 Mipsel
- Debian Linux 4.0 Powerpc
- Debian Linux 4.0 S/390
- Debian Linux 4.0 Sparc
- Debian Linux 4.0
- Mandriva Linux Mandrake 2007.1 X86 64
- Easy Software Products CUPS 1.3.5
- SuSE SUSE Linux Enterprise Desktop 10 SP2
- Avaya Messaging Storage Server MM3.0
- SuSE SUSE Linux Enterprise Server 10 SP2
- SuSE SUSE Linux Enterprise Server 9
- Avaya Voice Portal 3.0
- Red Hat Enterprise Linux AS 4
- Red Hat Enterprise Linux ES 4
- Red Hat Enterprise Linux WS 4
- Avaya Message Networking MN 3.1
- Ubuntu Ubuntu Linux 7.04 I386
- Sun OpenSolaris Build Snv 102
- Ubuntu Ubuntu Linux 6.06 LTS Sparc
- Turbolinux Turbolinux Server 10.0.0
- SuSE SUSE Linux Enterprise Desktop 10 SP1
- SuSE SUSE Linux Enterprise Server 10 SP1
- Mandriva Corporate Server 3.0.0 X86 64
- Avaya Messaging Storage Server 4.0
- Avaya Proactive Contact
- Turbolinux FUJI
- rPath Appliance Platform Linux Service 2
- Turbolinux Appliance Server 1.0.0 Hosting Edition
- Red Hat Fedora 9
- Avaya Proactive Contact 3.0
Severity: MEDIUM
Description:
This signature detects an attempt to exploit a known vulnerability in Oracle Java. The vulnerability is due to a read out of bounds error in awt_setPixels(). A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to visit a webpage containing a maliciously crafted Java applet. Successful exploitation could result in the disclosure of the memory contents.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- oracle fusion_middleware 11.1.1.3.0
HTTP:STC:ADOBE:AUD-SESSFILE - HTTP: Adobe Audition Session File Stack Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Adobe Audition. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- Adobe Audition 3.0
- Adobe Audition 3.0.1
- Adobe Audition 3.0 build 7283.0
HTTP:RUBYONRAILS-JSONYAML-RCE - HTTP: Ruby on Rails JSON YAML Parsing Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against applications developed using Ruby on Rails. A successful attack can lead to arbitrary code execution.
Supported On:
DI-Base, DI-Server, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- rubyonrails ruby_on_rails 2.3.15
- rubyonrails ruby_on_rails 3.0.19
- rubyonrails ruby_on_rails 2.3.14
- rubyonrails ruby_on_rails 3.0.18
- rubyonrails ruby_on_rails 3.0.10 (rc1)
- rubyonrails ruby_on_rails 3.0.0 (beta)
- rubyonrails ruby_on_rails 3.0.9 (rc4)
- rubyonrails ruby_on_rails 2.3.9
- rubyonrails ruby_on_rails 2.3.11
- rubyonrails ruby_on_rails 3.0.8 (rc4)
- rubyonrails ruby_on_rails 3.0.0 (rc2)
- rubyonrails ruby_on_rails 3.0.17
- rubyonrails ruby_on_rails 3.0.0 (beta4)
- rubyonrails ruby_on_rails 2.3.10
- rubyonrails ruby_on_rails 3.0.4 (rc1)
- rubyonrails ruby_on_rails 3.0.16
- rubyonrails ruby_on_rails 2.3.13
- rubyonrails ruby_on_rails 3.0.8 (rc3)
- rubyonrails ruby_on_rails 2.3.4
- rubyonrails ruby_on_rails 2.3.12
- rubyonrails ruby_on_rails 3.0.14
- rubyonrails ruby_on_rails 3.0.9 (rc1)
- rubyonrails ruby_on_rails 3.0.0 (beta3)
- rubyonrails ruby_on_rails 3.0.3
- rubyonrails ruby_on_rails 3.0.0 (rc)
- rubyonrails ruby_on_rails 2.3.3
- rubyonrails ruby_on_rails 3.0.11
- rubyonrails ruby_on_rails 3.0.7 (rc2)
- rubyonrails ruby_on_rails 2.3.2
- rubyonrails ruby_on_rails 3.0.9 (rc5)
- rubyonrails ruby_on_rails 3.0.1 (pre)
- rubyonrails ruby_on_rails 2.3.1
- rubyonrails ruby_on_rails 3.0.8 (rc1)
- rubyonrails ruby_on_rails 2.3.0
- rubyonrails ruby_on_rails 3.0.13 (rc1)
- rubyonrails ruby_on_rails 3.0.6 (rc1)
- rubyonrails ruby_on_rails 3.0.8 (rc2)
- rubyonrails ruby_on_rails 3.0.0 (beta2)
- rubyonrails ruby_on_rails 3.0.9 (rc3)
- rubyonrails ruby_on_rails 3.0.4 (rc)
- rubyonrails ruby_on_rails 3.0.12 (rc1)
- rubyonrails ruby_on_rails 3.0.2 (pre)
- rubyonrails ruby_on_rails 3.0.5 (rc1)
- rubyonrails ruby_on_rails 3.0.7 (rc1)
- rubyonrails ruby_on_rails 3.0.9 (rc2)
- rubyonrails ruby_on_rails 3.0.6 (rc2)
HTTP:STC:DL:MS-FON-FILE-RCE - HTTP: Microsoft Windows Bitmap Fonts Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known flaw in Microsoft Bitmap Fonts. An attack can entice a user to load a malicious .fon file which can result in arbitrary code execution in the victim's machine.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Windows XP Professional
- Microsoft Windows XP Home
- Microsoft Windows 7 for x64-based Systems
- Microsoft Windows XP Gold Professional
- Microsoft Windows 7 for 32-bit Systems
- Microsoft Windows Vista Business SP2
- Microsoft Windows Vista Business 64-bit edition SP2
- Microsoft Windows XP Embedded
- Microsoft Windows XP Embedded SP1
- Microsoft Windows Vista Home Basic 64-bit edition SP2
- Microsoft Windows Vista Home Basic SP2
- Microsoft Windows Vista Home Premium 64-bit edition SP2
- Microsoft Windows Vista Home Premium SP2
- Microsoft Windows Vista SP2
- Microsoft Windows Vista Ultimate 64-bit edition SP2
- Microsoft Windows Server 2008 Standard Edition X64
- Microsoft Windows Vista x64 Edition SP2
- Microsoft Windows Server 2008 Datacenter Edition SP2
- Microsoft Windows Vista December CTP X64
- Microsoft Windows Server 2008 Standard Edition SP2
- Microsoft Windows 7 Home Premium - Sp1 X64
- Microsoft Windows Server 2008 for 32-bit Systems SP2
- Microsoft Windows Server 2008 for Itanium-based Systems SP2
- Microsoft Windows Server 2003 SP1 Platform SDK
- Microsoft Windows Vista Home Basic 64-bit edition SP1
- Microsoft Windows Server 2008 Standard Edition Itanium
- Microsoft Windows Server 2008 Standard Edition - Gold Standard
- Microsoft Windows XP Media Center Edition SP1
- Microsoft Windows Server 2003 Gold Storage
- Microsoft Windows Server 2003 x64 SP2
- Microsoft Windows XP Tablet PC Edition
- Microsoft Windows 7 XP Mode
- Avaya Meeting Exchange 5.0.0.0.52
- Microsoft Windows Server 2003 Gold
- Microsoft Windows Vista Enterprise 64-bit edition SP2
- Microsoft Windows Server 2008 Standard Edition - Gold Itanium
- Microsoft Windows Vista Enterprise SP2
- Microsoft Windows Server 2008 - Sp2 Enterprise X64
- Microsoft Windows Server 2008 Datacenter Edition
- Microsoft Windows Server 2008 Enterprise Edition
- Microsoft Windows Server 2008 Datacenter Edition Release Candidate
- Microsoft Windows Vista Business SP1
- Microsoft Windows Vista Home Basic SP1
- Microsoft Windows Vista Home Premium SP1
- Microsoft Windows Vista Enterprise SP1
- Microsoft Windows Vista Ultimate SP1
- Microsoft Windows Vista Business 64-bit edition SP1
- Microsoft Windows Vista Enterprise 64-bit edition SP1
- Microsoft Windows Server 2008 Standard Edition - Gold Web
- Microsoft Windows Vista Home Premium 64-bit edition SP1
- Microsoft Windows Vista Ultimate 64-bit edition SP1
- Microsoft Windows Server 2003 x64 SP1
- Microsoft Windows Server 2003 Sp2 Storage
- Avaya Aura Conferencing 6.0 Standard
- Microsoft Windows Server 2003 Enterprise Edition Itanium SP2
- Microsoft Windows Server 2003 Enterprise Edition Itanium Sp2 Itanium
- Microsoft Windows Vista Home Basic 64-bit edition Sp1 X64
- Microsoft Windows Vista Home Basic 64-bit edition Sp2 X64
- Microsoft Windows Vista x64 Edition
- Microsoft Windows Server 2003 Web Edition SP2
- Microsoft Windows Server 2008 for x64-based Systems SP2
- Microsoft Windows XP Professional x64 Edition SP2
- Microsoft Windows Server 2003 Itanium
- Microsoft Windows Server 2003 Itanium SP1
- Microsoft Windows Server 2003 Itanium SP2
- Microsoft Windows Server 2003 Datacenter x64 Edition SP2
- Microsoft Windows Server 2003 Enterprise x64 Edition SP2
- Microsoft Windows Server 2003 Standard Edition SP2
- Microsoft Windows XP Media Center Edition 2005 SP3
- Microsoft Windows XP Tablet PC Edition SP1
- Microsoft Windows Vista 2.0
- Avaya Meeting Exchange 5.2
- Microsoft Windows Server 2008 R2 Datacenter
- Microsoft Windows Server 2008 Enterprise Edition SP2
- Microsoft Windows Server 2003 Terminal Services
- Microsoft Windows 7 Home Premium - Sp1 X32
- Microsoft Windows Server 2003 Gold X64-Standard
- Microsoft Windows Server 2003 Sp2 Datacenter
- Avaya CallPilot 4.0
- Microsoft Windows Server 2003 Sp1 X64
- Microsoft Windows Server 2003 Sp2 X64
- Avaya Communication Server 1000 Telephony Manager 4.0
- Microsoft Windows Vista Business 64-bit edition X64-Ultimate
- Microsoft Windows Server 2003 Gold Datacenter
- Microsoft Windows Vista Business 64-bit edition Sp1 X64-Enterprise
- Microsoft Windows Vista Business 64-bit edition Sp1 X64-Home Premium
- Microsoft Windows Vista Business 64-bit edition Sp1 X64-Ultimate
- Microsoft Windows Server 2008 Standard Edition - Gold Datacenter
- Microsoft Windows XP - Sp1 X64
- Microsoft Windows Server 2008 Standard Edition - Gold
- Avaya Meeting Exchange 5.0 SP1
- Avaya Meeting Exchange 5.0 SP2
- Avaya Meeting Exchange 5.1 SP1
- Microsoft Windows Server 2008 Standard Edition - Sp2 Hpc
- Microsoft Windows XP 64-bit Edition Version 2003
- Microsoft Windows XP Media Center Edition
- Microsoft Windows XP - Gold Home
- Microsoft Windows Vista x64 Edition SP1
- Microsoft Windows Server 2003 Gold Compute Cluster
- Microsoft Windows Vista Beta 2
- Microsoft Windows XP 64-bit Edition
- Microsoft Windows XP Gold Tablet Pc
- Microsoft Windows XP Home SP1
- Microsoft Windows XP Professional SP1
- Microsoft Windows XP Tablet PC Edition SP3
- Microsoft Windows XP Professional SP3
- Microsoft Windows XP Media Center Edition SP3
- Microsoft Windows XP Home SP3
- Microsoft Windows Server 2003 Datacenter Edition SP1
- Microsoft Windows Server 2003 Datacenter Edition Itanium SP1
- Microsoft Windows Server 2003 Enterprise Edition Itanium SP1
- Microsoft Windows Server 2003 Enterprise Edition SP1
- Microsoft Windows Server 2003 Standard Edition SP1
- Microsoft Windows Server 2003 Web Edition SP1
- Microsoft Windows Server 2003 Gold Enterprise
- Microsoft Windows XP 64-bit Edition SP1
- Microsoft Windows Server 2003 Enterprise Edition
- Microsoft Windows Server 2003 Datacenter Edition
- Microsoft Windows Server 2003 Web Edition
- Microsoft Windows Server 2003 Enterprise Edition Itanium
- Microsoft Windows Server 2003 Datacenter Edition Itanium
- Microsoft Windows Server 2008 R2 x64
- Microsoft Windows Server 2003 Gold X64
- Avaya Meeting Exchange 5.1
- Microsoft Windows Server 2008 SP2 Beta
- Avaya Meeting Exchange 5.2 SP2
- Microsoft Windows Server 2008 R2 Datacenter SP1
- Microsoft Windows Server 2008 R2 Itanium SP1
- Microsoft Windows Server 2008 R2 x64 SP1
- Microsoft Windows 7 for 32-bit Systems SP1
- Microsoft Windows Server 2008 Standard Edition - Gold Storage
- Microsoft Windows Server 2008 Standard Edition - Sp2 Web
- Microsoft Windows 7 RC
- Microsoft Windows Server 2008 for x64-based Systems R2
- Microsoft Windows Server 2008 for Itanium-based Systems R2
- Microsoft Windows XP - Gold X64
- Microsoft Windows Vista December CTP Gold
- Microsoft Windows XP Tablet PC Edition SP2
- Microsoft Windows Vista 1.0
- Microsoft Windows XP Embedded SP2
- Microsoft Windows XP Embedded SP3
- Microsoft Windows XP Gold Media Center
- Avaya Meeting Exchange - Client Registration Server
- Avaya Meeting Exchange - Recording Server
- Avaya Meeting Exchange - Web Conferencing Server
- Avaya Meeting Exchange - Webportal
- Microsoft Windows Server 2003 Gold Itanium
- Microsoft Windows Server 2003 Sp2 Compute Cluster
- Microsoft Windows Server 2003 Datacenter Edition SP1 Beta 1
- Microsoft Windows Server 2003 Datacenter Edition Itanium SP1 Beta 1
- Microsoft Windows Server 2003 Enterprise Edition Itanium SP1 Beta 1
- Microsoft Windows Server 2003 Enterprise Edition SP1 Beta 1
- Microsoft Windows Server 2003 Standard Edition SP1 Beta 1
- Microsoft Windows Server 2003 Web Edition SP1 Beta 1
- Microsoft Windows Server 2003 SP2
- Microsoft Windows Server 2003 Sp1 Compute Cluster
- Microsoft Windows Vista December CTP
- Microsoft Windows XP Gold
- Microsoft Windows Server 2003 Gold Standard
- Microsoft Windows 7 for x64-based Systems SP1
- Microsoft Windows Vista Ultimate SP2
- Microsoft Windows Server 2008 Standard Edition - Sp2 Storage
- Microsoft Windows Server 2003 Sp1 Storage
- Microsoft Windows Server 2003 Gold X64-Datacenter
- Microsoft Windows Server 2008 R2 Itanium
- Avaya CallPilot 5.0
- Microsoft Windows Vista Enterprise
- Avaya Communication Server 1000 Telephony Manager 3.0
- Microsoft Windows XP Home SP2
- Microsoft Windows XP Professional SP2
- Avaya Meeting Exchange 5.2 SP1
- Microsoft Windows XP Media Center Edition SP2
- Avaya Messaging Application Server 5.2
- Microsoft Windows Vista December CTP SP1
- Microsoft Windows Vista SP1
- Microsoft Windows 7 Home Premium
- Microsoft Windows 7 Starter
- Microsoft Windows 7 Professional
- Microsoft Windows 7 Ultimate
- Microsoft Windows Server 2003 Enterprise x64 Edition
- Microsoft Windows Server 2008 R2 Standard Edition
- Microsoft Windows Server 2008 Standard Edition - Gold Hpc
- Microsoft Windows Server 2003 Sp2 Enterprise
- Microsoft Windows XP 64-bit Edition Version 2003 SP1
- Microsoft Windows Server 2008 R2 for x64-based Systems SP1
- Avaya Meeting Exchange 5.0
- Microsoft Windows Server 2008 R2 Enterprise Edition
- Microsoft Windows Vista December CTP SP2
- Microsoft Windows Vista 3.0
- Microsoft Windows Vista Ultimate
- Microsoft Windows Vista Home Premium
- Microsoft Windows Vista Home Basic
- Microsoft Windows Vista Business
- Microsoft Windows Server 2008 Standard Edition R2
- Microsoft Windows Server 2003 Standard Edition
- Microsoft Windows Server 2008 Standard Edition - Gold Enterprise
- Microsoft Windows Server 2008 Standard Edition R2 SP1
- Microsoft Windows XP
- Avaya Messaging Application Server 4
- Avaya Messaging Application Server 5
- Microsoft Windows XP Service Pack 3
- Microsoft Windows Server 2003 Standard x64 Edition
- Microsoft Windows Server 2003 SP1
- Microsoft Windows Server 2003 Datacenter x64 Edition
- Microsoft Windows Server 2008 R2
- Microsoft Windows XP Professional x64 Edition
- Microsoft Windows Server 2003 Gold X64-Enterprise
- Microsoft Windows Vista Business 64-bit edition
- Microsoft Windows Vista Enterprise 64-bit edition
- Microsoft Windows Vista Home Basic 64-bit edition
- Microsoft Windows Vista Home Premium 64-bit edition
- Microsoft Windows Vista Ultimate 64-bit edition
- Microsoft Windows Vista
- Microsoft Windows Vista Beta
- Microsoft Windows Server 2008 Standard Edition Release Candidate
- Microsoft Windows Vista SP2 Beta
- Microsoft Windows Vista Beta 1
- Microsoft Windows Server 2008 Enterprise Edition Release Candidate
- Microsoft Windows Vista Business 64-bit edition X64-Enterprise
- Microsoft Windows Server 2008 Standard Edition
- Microsoft Windows Server 2008 for 32-bit Systems
- Microsoft Windows Server 2008 for x64-based Systems
- Microsoft Windows Server 2008 for Itanium-based Systems
- Microsoft Windows XP - Gold 64-Bit-2002
- Microsoft Windows XP Gold Embedded
- Microsoft Windows XP
HTTP:STC:JAVA:IMG-SETPIXELS-OF - HTTP: Oracle Java ImageRepresentation.setPixels Integer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Oracle Java. The vulnerability is due to improper validation of image and raster dimensions in the sun.awt.image.ImageRepresentation.setPixels method. A remote attacker can exploit this vulnerability by enticing the target user to visit a specially crafted web page. Successful exploitation of this vulnerability can allow execution of arbitrary code on a target system.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- oracle jdk up to 1.5.0 (update_40)
- sun jdk 1.5.0 (update17)
- oracle jdk up to 1.6.0 (update_33)
- sun jdk 1.6.0 (update_11)
- oracle jre up to 1.6.0 (update_29)
- oracle jre up to 1.7.0 (update6)
- sun jre 1.5.0 (update8)
- sun jre 1.6.0 (update_4)
- sun jre 1.6.0 (update_3)
- sun jre 1.5.0 (update28)
- oracle jre up to 1.6.0 (update_38)
- oracle jdk up to 1.6.0 (update_22)
- sun jdk 1.5.0 (update11)
- sun jdk 1.5.0 (update6)
- sun jdk 1.5.0 (update20)
- sun jdk 1.5.0 (update28)
- oracle jre up to 1.6.0 (update_23)
- oracle jre up to 1.6.0 (update_24)
- oracle jdk up to 1.7.0 (update13)
- sun jdk 1.6.0 (update_14)
- sun jre 1.6.0 (update_18)
- oracle jre up to 1.5.0 (update_36)
- oracle jre up to 1.5.0 (update_40)
- oracle jdk up to 1.7.0 (update10)
- sun jre 1.5.0 (update4)
- sun jdk 1.5.0 (update3)
- sun jdk 1.6.0 (update_7)
- sun jre 1.6.0 (update_13)
- sun jdk 1.5.0 (update9)
- oracle jdk up to 1.5.0 (update_38)
- sun jdk 1.5.0 (update2)
- sun jre 1.6.0 (update_10)
- sun jre 1.5.0 (update31)
- oracle jdk up to 1.6.0 (update_43)
- sun jre 1.5.0 (update26)
- sun jdk 1.5.0 (update26)
- sun jdk 1.6.0 (update1)
- sun jre 1.5.0 (update18)
- sun jdk 1.6.0 (update_12)
- oracle jdk up to 1.7.0 (update15)
- oracle jdk up to 1.7.0 (update2)
- oracle jdk up to 1.7.0 (update1)
- oracle jdk up to 1.6.0 (update_39)
- sun jre 1.5.0 (update3)
- sun jre 1.5.0 (update33)
- oracle jdk up to 1.6.0 (update_27)
- sun jre 1.5.0 (update1)
- sun jdk 1.5.0 (update23)
- sun jre 1.6.0 (update_7)
- oracle jdk up to 1.7.0 (update4)
- oracle jre up to 1.7.0 (update9)
- sun jre 1.5.0 (update7)
- oracle jre up to 1.7.0 (update5)
- oracle jre up to 1.6.0 (update_31)
- sun jdk 1.5.0 (update24)
- oracle jre up to 1.5.0 (update_41)
- sun jre 1.6.0 (update_15)
- sun jre 1.6.0 (update_21)
- sun jre 1.5.0 (update10)
- sun jdk 1.6.0 (update_18)
- sun jre 1.5.0 (update25)
- sun jre 1.5.0 (update21)
- oracle jdk up to 1.6.0 (update_34)
- sun jre 1.6.0 (update_12)
- oracle jre up to 1.6.0 (update_27)
- oracle jre up to 1.7.0 (update3)
- oracle jdk up to 1.6.0 (update_26)
- oracle jdk up to 1.6.0 (update_29)
- oracle jre up to 1.6.0 (update_30)
- sun jre 1.6.0 (update_17)
- oracle jdk up to 1.6.0 (update_23)
- sun jre 1.5.0 (update9)
- sun jdk 1.6.0 (update_19)
- sun jdk 1.6.0 (update_4)
- sun jdk 1.5.0 (update11_b03)
- sun jdk 1.5.0 (update31)
- sun jre 1.5.0 (update17)
- sun jre 1.6.0 (update_5)
- sun jdk 1.6.0 (update_16)
- sun jre 1.5.0 (update29)
- oracle jdk up to 1.6.0 (update_32)
- oracle jdk up to 1.6.0 (update_37)
- oracle jre up to 1.7.0 (update13)
- oracle jre up to 1.7.0 (update15)
- sun jdk 1.5.0 (update27)
- oracle jdk up to 1.5.0 (update_36)
- oracle jdk up to 1.6.0 (update_30)
- sun jre 1.5.0 (update15)
- sun jre 1.5.0 (update12)
- sun jre 1.5.0 (update5)
- sun jre 1.5.0 (update22)
- sun jre 1.5.0 (update23)
- oracle jre up to 1.6.0 (update_22)
- sun jdk 1.5.0 (update22)
- sun jdk 1.6.0 (update_20)
- sun jdk 1.5.0 (update7)
- sun jdk 1.5.0 (update21)
- oracle jdk up to 1.7.0 (update17)
- sun jdk 1.6.0 (update_10)
- oracle jdk up to 1.6.0 (update_38)
- oracle jre up to 1.7.0 (update7)
- sun jdk 1.5.0 (update29)
- oracle jre up to 1.6.0 (update_41)
- oracle jdk up to 1.7.0 (update3)
- sun jdk 1.5.0 (update14)
- sun jdk 1.6.0 (update_17)
- oracle jre up to 1.6.0 (update_33)
- oracle jre up to 1.6.0 (update_35)
- sun jdk 1.6.0 (update_21)
- oracle jre up to 1.7.0 (update4)
- oracle jdk up to 1.7.0 (update6)
- oracle jdk up to 1.7.0 (update5)
- oracle jdk up to 1.7.0 (update9)
- oracle jdk up to 1.5.0 (update_41)
- oracle jre up to 1.6.0 (update_25)
- sun jdk 1.6.0 (update_15)
- oracle jdk up to 1.6.0 (update_31)
- sun jdk 1.5.0 (update25)
- sun jdk 1.5.0 (update1)
- oracle jre up to 1.7.0 (update2)
- sun jre 1.5.0 (update27)
- oracle jre up to 1.6.0 (update_32)
- oracle jre up to 1.6.0 (update_34)
- sun jdk 1.5.0 (update15)
- sun jdk 1.5.0 (update12)
- sun jre 1.6.0 (update_14)
- oracle jre up to 1.7.0 (update10)
- oracle jre up to 1.7.0 (update11)
- sun jdk 1.5.0 (update5)
- oracle jre up to 1.7.0 (update17)
- sun jdk 1.6.0 (update1_b06)
- sun jre 1.6.0 (update_11)
- oracle jre up to 1.6.0 (update_26)
- oracle jdk up to 1.7.0 (update11)
- oracle jre up to 1.5.0 (update_38)
- sun jre 1.6.0 (update_9)
- sun jre 1.6.0 (update_19)
- sun jdk 1.5.0 (update8)
- sun jdk 1.5.0 (update7_b03)
- sun jre 1.5.0 (update2)
- sun jdk 1.6.0 (update_5)
- sun jre 1.6.0 (update_16)
- sun jre 1.5.0 (update19)
- sun jre 1.5.0 (update16)
- oracle jdk up to 1.7.0 (update7)
- oracle jdk up to 1.6.0 (update_24)
- sun jdk 1.5.0 (update18)
- sun jdk 1.6.0 (update2)
- sun jre 1.5.0 (update13)
- sun jdk 1.6.0 (update_6)
- sun jre 1.5.0 (update14)
- sun jre 1.6.0 (update_2)
- sun jre 1.6.0 (update_1)
- sun jdk 1.5.0 (update4)
- sun jre 1.6.0 (update_20)
- sun jdk 1.6.0 (update_13)
- sun jdk 1.6.0 (update_3)
- oracle jre up to 1.6.0 (update_43)
- sun jre 1.5.0 (update11)
- sun jre 1.5.0 (update6)
- oracle jdk up to 1.6.0 (update_25)
- sun jre 1.5.0 (update24)
- sun jre 1.5.0 (update20)
- sun jdk 1.5.0 (update13)
- sun jdk 1.5.0 (update10)
- sun jdk 1.5.0 (update19)
- sun jdk 1.5.0 (update16)
- oracle jre up to 1.7.0 (update1)
- oracle jdk up to 1.6.0 (update_41)
- oracle jre up to 1.6.0 (update_37)
- oracle jre up to 1.6.0 (update_39)
- sun jdk 1.5.0 (update33)
- sun jre 1.6.0 (update_6)
- oracle jdk up to 1.6.0 (update_35)
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against PHP. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- php 5.0.4
- php 3.0.1
- php 5.4.4
- php 4.4.6
- php 1.0
- php 5.3.9
- php 3.0.3
- php 5.1.4
- php up to 5.3.25
- php 4.3.2
- php 5.3.21
- php 3.0.5
- php 4.3.4
- php 5.3.23
- php 5.3.12
- php 4.0 (beta4)
- php 3.0.7
- php 5.1.6
- php 4.4.8
- php 5.2.5
- php 5.4.11
- php 5.2.7
- php 5.1.0
- php 5.2.12
- php 4.3.11
- php 5.2.1
- php 5.3.15
- php 4.3.0
- php 2.0
- php 4.4.5
- php 5.2.10
- php 5.2.3
- php 4.0.6
- php 5.2.16
- php 5.3.18
- php 4.0.4
- php 5.3.1
- php 5.2.14
- php 5.1.3
- php 5.0.3
- php 4.0.2
- php 5.3.3
- php 4.0.0
- php 5.2.9
- php 5.3.5
- php 5.3.7
- php 5.3.10
- php 5.4.10
- php 4.2.0
- php 5.0.5
- php 5.4.9
- php 5.4.12
- php 4.2.2
- php 5.3.14
- php 3.0.8
- php 5.4.14
- php 5.3.13
- php 5.3.16
- php 5.0.0 (rc1)
- php 5.0.1
- php 5.0.0 (beta4)
- php 4.3.9
- php 3.0.15
- php 5.4.3
- php 4.4.3
- php 3.0.13
- php 5.4.1
- php 5.1.1
- php 3.0.17
- php 5.0.0 (beta1)
- php 3.0.11
- php 5.4.7
- php 4.4.7
- php 3.0.2
- php 5.0.0 (rc3)
- php 5.2.4
- php 5.4.5
- php 5.1.5
- php 4.0 (beta3)
- php 5.2.8
- php 5.1.2
- php 4.0 (beta2)
- php 4.3.1
- php 5.3.20
- php 3.0.4
- php 4.0 (beta_4_patch1)
- php 4.3.3
- php 5.3.22
- php 3.0.6
- php 4.4.9
- php 5.4.2
- php 5.0.0 (beta2)
- php 4.3.5
- php 5.3.24
- php 5.2.6
- php 4.3.7
- php 4.3.10
- php 5.2.0
- php 4.3.6
- php 5.2.13
- php 5.2.2
- php 2.0b10
- php 4.0.7
- php 5.2.11
- php 5.3.19
- php 4.0.5
- php 3.0
- php 5.2.17
- php 4.0.3
- php 5.3.0
- php 5.2.15
- php 5.4.0
- php 4.0.1
- php 5.3.2
- php 5.3.4
- php 5.3.11
- php 5.3.6
- php 4.2.1
- php 4.1.1
- php 4.4.1
- php 5.4.8
- php 5.3.8
- php 4.2.3
- php 5.0.2
- php 5.0.0 (beta3)
- php 3.0.18
- php 5.4.13
- php 5.3.17
- php 3.0.9
- php 3.0.16
- php 5.4.15
- php 4.3.8
- php 3.0.14
- php 4.1.2
- php 4.4.4
- php 3.0.12
- php 4.1.0
- php 4.4.2
- php 5.0.0 (rc2)
- php 4.0 (beta1)
- php 3.0.10
- php 5.4.6
- php 4.4.0
HTTP:STC:ACTIVEX:BORLAND-TCHAR1 - HTTP: Borland Silk Central Tee Chart Pro AddSeries Unsafe ActiveX Control Remote Code Execution1
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Borland Silk Central Tee Chart Pro. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
HTTP:STC:DL:XLS-BIN-OF - HTTP: Microsoft Office Excel Binary Format Parsing Integer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Excel. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Office Excel Viewer 2003
- Microsoft Excel 2004 for Mac
- Microsoft Excel 2007
- Microsoft Office Compatibility Pack 2007 SP1
- Microsoft Excel 2000
- Microsoft Excel 2000 SP2
- Microsoft Excel 2000 SR1
- Microsoft Office Excel Viewer 2003 SP3
- Microsoft Excel 2002 SP1
- Microsoft Excel 2002 SP2
- Microsoft SharePoint Server 2007
- Microsoft Excel 2008 for Mac
- Microsoft Excel 2007 SP1
- Microsoft Excel 2003 SP3
- Microsoft SharePoint Server 2007 SP1
- Microsoft SharePoint Server 2007 x64 SP1
- Microsoft SharePoint Server 2007 x64
- Microsoft Excel 2003 SP1
- Microsoft Open XML File Format Converter for Mac
- Microsoft Office Compatibility Pack 2007
- Microsoft Excel 2002
- Microsoft Excel 2003 SP2
- Microsoft Excel 2007 SP2
- Microsoft Excel 2000 SP3
- Microsoft Excel 2003
- Microsoft Office Compatibility Pack 2007 SP2
- Microsoft Excel 2002 SP3
- Microsoft Excel Viewer
- Microsoft Excel Viewer SP3
- Microsoft SharePoint Server 2007 SP2
- Microsoft SharePoint Server 2007 x64 SP2
- Microsoft Excel 2000
HTTP:STC:JAVA:IMG-INTEGER-MC - HTTP: Oracle Java java.awt.image.IntegerComponentRaster Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known flaw in Oracle Java Runtime. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- oracle jdk up to 1.5.0 (update_40)
- sun jdk 1.5.0 (update17)
- oracle jdk up to 1.6.0 (update_33)
- sun jdk 1.6.0 (update_11)
- oracle jre up to 1.6.0 (update_29)
- oracle jre up to 1.7.0 (update6)
- sun jre 1.5.0 (update8)
- sun jre 1.6.0 (update_4)
- sun jre 1.6.0 (update_3)
- oracle jdk up to 1.7.0 (update21)
- sun jre 1.5.0 (update28)
- oracle jre up to 1.6.0 (update_38)
- oracle jdk up to 1.6.0 (update_22)
- sun jdk 1.5.0 (update11)
- sun jdk 1.5.0 (update6)
- sun jdk 1.5.0 (update20)
- sun jdk 1.5.0 (update28)
- oracle jre up to 1.6.0 (update_23)
- oracle jre up to 1.6.0 (update_24)
- oracle jdk up to 1.7.0 (update13)
- sun jdk 1.6.0 (update_14)
- sun jre 1.6.0 (update_18)
- oracle jre up to 1.5.0 (update_36)
- oracle jre up to 1.5.0 (update_40)
- oracle jdk up to 1.7.0 (update10)
- sun jre 1.5.0 (update4)
- sun jdk 1.5.0 (update3)
- sun jdk 1.6.0 (update_7)
- sun jre 1.6.0 (update_13)
- sun jdk 1.5.0 (update9)
- oracle jdk up to 1.5.0 (update_38)
- sun jdk 1.5.0 (update2)
- sun jre 1.6.0 (update_10)
- sun jre 1.5.0 (update31)
- oracle jdk up to 1.6.0 (update_43)
- sun jre 1.5.0 (update26)
- sun jdk 1.5.0 (update26)
- sun jdk 1.6.0 (update1)
- sun jre 1.5.0 (update18)
- sun jdk 1.6.0 (update_12)
- oracle jdk up to 1.7.0 (update15)
- oracle jdk up to 1.7.0 (update2)
- oracle jdk up to 1.7.0 (update1)
- oracle jdk up to 1.6.0 (update_39)
- sun jre 1.5.0 (update3)
- sun jre 1.5.0 (update33)
- oracle jdk up to 1.6.0 (update_27)
- sun jre 1.5.0 (update1)
- sun jdk 1.5.0 (update23)
- oracle jre up to 1.6.0 (update_45)
- sun jre 1.6.0 (update_7)
- oracle jdk up to 1.7.0 (update4)
- oracle jre up to 1.7.0 (update9)
- sun jre 1.5.0 (update7)
- oracle jre up to 1.7.0 (update5)
- oracle jre up to 1.6.0 (update_31)
- sun jdk 1.5.0 (update24)
- oracle jre up to 1.5.0 (update_41)
- sun jre 1.6.0 (update_15)
- sun jre 1.6.0 (update_21)
- sun jre 1.5.0 (update10)
- sun jdk 1.6.0 (update_18)
- sun jre 1.5.0 (update25)
- sun jre 1.5.0 (update21)
- oracle jdk up to 1.6.0 (update_34)
- oracle jdk up to 1.5.0 (update_45)
- sun jre 1.6.0 (update_12)
- oracle jre up to 1.6.0 (update_27)
- oracle jre up to 1.7.0 (update3)
- oracle jdk up to 1.6.0 (update_26)
- oracle jdk up to 1.6.0 (update_29)
- oracle jre up to 1.6.0 (update_30)
- sun jre 1.6.0 (update_17)
- sun jdk 1.6.0 (update1_b06)
- oracle jdk up to 1.6.0 (update_23)
- sun jre 1.5.0 (update9)
- sun jdk 1.6.0 (update_19)
- sun jdk 1.6.0 (update_4)
- sun jdk 1.5.0 (update11_b03)
- sun jdk 1.5.0 (update31)
- sun jre 1.5.0 (update17)
- sun jre 1.6.0 (update_5)
- sun jdk 1.6.0 (update_16)
- sun jre 1.5.0 (update29)
- oracle jdk up to 1.6.0 (update_32)
- oracle jdk up to 1.6.0 (update_37)
- oracle jre up to 1.7.0 (update13)
- sun jdk 1.5.0 (update21)
- sun jdk 1.5.0 (update27)
- oracle jdk up to 1.5.0 (update_36)
- oracle jdk up to 1.6.0 (update_30)
- sun jre 1.5.0 (update15)
- sun jre 1.5.0 (update12)
- sun jre 1.5.0 (update5)
- sun jre 1.5.0 (update22)
- sun jre 1.5.0 (update23)
- oracle jre up to 1.6.0 (update_22)
- sun jdk 1.5.0 (update22)
- sun jdk 1.6.0 (update_20)
- sun jdk 1.5.0 (update7)
- oracle jdk up to 1.7.0 (update17)
- sun jdk 1.6.0 (update_10)
- oracle jdk up to 1.6.0 (update_38)
- oracle jre up to 1.7.0 (update7)
- sun jdk 1.5.0 (update29)
- oracle jre up to 1.6.0 (update_41)
- oracle jdk up to 1.7.0 (update3)
- sun jdk 1.5.0 (update14)
- sun jdk 1.6.0 (update_17)
- oracle jre up to 1.7.0 (update21)
- oracle jre up to 1.6.0 (update_35)
- oracle jdk up to 1.6.0 (update_45)
- sun jdk 1.6.0 (update_21)
- oracle jre up to 1.7.0 (update4)
- oracle jdk up to 1.7.0 (update6)
- oracle jdk up to 1.7.0 (update5)
- oracle jdk up to 1.7.0 (update9)
- oracle jdk up to 1.5.0 (update_41)
- oracle jre up to 1.6.0 (update_25)
- sun jdk 1.6.0 (update_15)
- oracle jdk up to 1.6.0 (update_31)
- sun jdk 1.5.0 (update25)
- sun jdk 1.5.0 (update1)
- oracle jre up to 1.7.0 (update2)
- sun jre 1.5.0 (update27)
- oracle jre up to 1.6.0 (update_32)
- oracle jre up to 1.6.0 (update_34)
- sun jdk 1.5.0 (update15)
- sun jdk 1.5.0 (update12)
- sun jre 1.6.0 (update_14)
- oracle jre up to 1.7.0 (update10)
- oracle jre up to 1.7.0 (update11)
- sun jdk 1.5.0 (update5)
- oracle jre up to 1.7.0 (update17)
- oracle jre up to 1.6.0 (update_33)
- sun jre 1.6.0 (update_11)
- oracle jre up to 1.6.0 (update_26)
- oracle jdk up to 1.7.0 (update11)
- oracle jre up to 1.5.0 (update_38)
- sun jre 1.6.0 (update_9)
- sun jre 1.6.0 (update_19)
- oracle jre up to 1.7.0 (update15)
- sun jdk 1.5.0 (update8)
- sun jdk 1.5.0 (update7_b03)
- oracle jre up to 1.6.0 (update_39)
- sun jre 1.5.0 (update2)
- sun jdk 1.6.0 (update_5)
- sun jre 1.6.0 (update_16)
- sun jre 1.5.0 (update19)
- sun jre 1.5.0 (update16)
- oracle jdk up to 1.7.0 (update7)
- oracle jdk up to 1.6.0 (update_24)
- sun jdk 1.5.0 (update18)
- sun jdk 1.6.0 (update2)
- oracle jre up to 1.5.0 (update_39)
- sun jre 1.5.0 (update13)
- sun jdk 1.6.0 (update_6)
- sun jre 1.5.0 (update14)
- oracle jdk up to 1.5.0 (update_39)
- sun jre 1.6.0 (update_2)
- sun jre 1.6.0 (update_1)
- sun jdk 1.5.0 (update4)
- sun jre 1.6.0 (update_20)
- sun jdk 1.6.0 (update_13)
- sun jdk 1.6.0 (update_3)
- oracle jre up to 1.6.0 (update_43)
- sun jre 1.5.0 (update11)
- sun jre 1.5.0 (update6)
- oracle jdk up to 1.6.0 (update_25)
- sun jre 1.5.0 (update24)
- sun jre 1.5.0 (update20)
- sun jdk 1.5.0 (update13)
- sun jdk 1.5.0 (update10)
- sun jdk 1.5.0 (update19)
- sun jdk 1.5.0 (update16)
- oracle jre up to 1.7.0 (update1)
- oracle jdk up to 1.6.0 (update_41)
- oracle jre up to 1.6.0 (update_37)
- oracle jre up to 1.5.0 (update_45)
- sun jdk 1.5.0 (update33)
- sun jre 1.6.0 (update_6)
- oracle jdk up to 1.6.0 (update_35)
HTTP:MS-WINDOWS-X509-DOS - HTTP: Microsoft Windows X.509 Certificate Validation Denial of Service
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Windows. A successful attack can result in a denial-of-service condition.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- microsoft windows_server_2008 r2 (sp1:itanium)
- microsoft windows_server_2008 r2 (sp1:x64)
- microsoft windows_server_2008 (sp2:x86)
- microsoft windows_2003_server (sp2:itanium)
- microsoft windows_vista (sp2:x64)
- microsoft windows_7 (sp1:x86)
- microsoft windows_8 - (-:x86)
- microsoft windows_xp (sp2:professional)
- microsoft windows_8.1 - (-:~-~-~-~x86~)
- microsoft windows_server_2008 (sp2:itanium)
- microsoft windows_xp (sp3)
- microsoft windows_rt -
- microsoft windows_7 (sp1:x64)
- microsoft windows_server_2012 -
- microsoft windows_server_2012 r2 (-:~-~standard~~~)
- microsoft windows_rt_8.1 -
- microsoft windows_server_2008 (sp2:x64)
- microsoft windows_8.1 - (-:~-~-~-~x64~)
- microsoft windows_2003_server (sp2:x64)
- microsoft windows_8 - (-:x64)
HTTP:STC:DL:WORD-FILE-MEM - HTTP: Microsoft Office Multiple File Handling Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Word and Publisher. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Word 2000 SP3
- Microsoft Word 2002
- Microsoft Word 2002 SP2
- Avaya Messaging Application Server
- Avaya Messaging Application Server MM 3.0
- Avaya Messaging Application Server MM 3.1
- Microsoft Office XP SP3
- Microsoft Office XP SP1
- Avaya Messaging Application Server MM 1.1
- Microsoft Word 2002 SP1
- Microsoft Office XP
- Microsoft Word 2000 SR1
- Microsoft Word 2000 Sr1a
- Microsoft Word 2000 SP2
- Avaya Messaging Application Server MM 2.0
- Microsoft Word Viewer 2003
- Microsoft Word 2002 SP3
- Microsoft Word 2003 SP1
- Microsoft Office XP SP2
CHAT:AIM:OVERFLOW:AIM-HTTP-AWAY - CHAT: AOL Instant Messenger Away Message Remote Buffer Overflow
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability in the AOL Instant Messenger. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- AOL Instant Messenger 5.5.3595
- AOL Instant Messenger 5.5.0
- AOL Instant Messenger 5.5.3415 Beta
HTTP:STC:DL:PPT-SHAPES-MEM - HTTP: Microsoft PowerPoint Drawing Shapes Handling Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft PowerPoint. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Office 2000 SP3
- Microsoft Office XP
- Microsoft Office XP SP3
- Microsoft Office 2003 SP1
- Microsoft Office 2000 SP1
- Microsoft Office 2000 SP2
- Microsoft Office XP SP1
- Microsoft Office 2003 SP2
- Microsoft Office 2004 for Mac
- Microsoft Office XP SP2
- Microsoft Office 2000
- Microsoft Office 2003
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Excel. A successful attack can lead to memory corruption and arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- microsoft sharepoint_foundation 2010 (sp1)
- microsoft excel 2007 (sp3)
- microsoft office_compatibility_pack (sp3)
- microsoft excel 2010 (sp2:~~~x64~~)
- microsoft excel 2010 (sp1)
- microsoft sharepoint_services 3.0
- microsoft excel_2013_rt -
- microsoft excel 2013 (:~~~x64~~)
- microsoft excel 2013 (:~~~x86~~)
- microsoft excel 2003 (sp3)
- microsoft excel_viewer
- microsoft sharepoint_server 2010 (sp2)
- microsoft sharepoint_server 2007 (sp3)
- microsoft sharepoint_foundation 2010 (sp2)
- microsoft sharepoint_server 2010 (sp1)
- microsoft sharepoint_portal_server 2003 (sp3)
- microsoft sharepoint_services 2.0
- microsoft excel 2010 (sp2:~~~x86~~)
- microsoft office_web_apps 2010 (sp1)
- microsoft office 2011 (:mac)
HTTP:STC:JAVA:GSUB-TABLE-BO - HTTP: Oracle Java SE GSUB FeatureCount Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Oracle Java. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
APP:WINAMP:MIDI-FILE-OF - APP: Nullsoft Winamp MIDI File Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Nullsoft Winamp. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
HTTP:STC:STREAM:DIRECTSHOW-MJP1 - HTTP: Microsoft Windows MJPEG Media Decompression Code Execution1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability in the Microsoft Windows DirectShow component. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against PHP phar_set_inode function. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- php 5.5.1
- php 5.6.0
- php 5.5.0
- php 5.5.19
- php 5.6.2
- php 5.5.18
- php 5.6.3
- php 5.4.39
- php 5.6.4
- php 5.6.5
- php 5.6.6
- php 5.5.22
- php 5.6.7
- php 5.5.23
- php 5.5.14
- php 5.5.20
- php 5.5.9
- php 5.5.13
- php 5.5.21
- php 5.5.8
- php 5.5.12
- php 5.5.7
- php 5.5.11
- php 5.5.6
- php 5.5.10
- php 5.5.5
- php 5.5.4
- php 5.5.3
- php 5.5.2
HTTP:STC:ACTIVEX:MSCOMCTL-OCX1 - HTTP: Microsoft Windows Common Control 'MSCOMCTL.OCX' Unsafe ActiveX Control1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known flaw in the Microsoft Windows Common ActiveX control. An attacker could exploit the vulnerability by constructing a specially crafted Web page or sending a malicious RTF document. Visiting the website with a vulnerable version of Internet Explorer, or opening the RTF document with Office or Wordpad could result in arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
HTTP:PHP:VS-NEWS-RFI1 - HTTP: VirtualSystem VS-News-System Show_News_Inc.PHP Remote File Inclusion1
Severity: HIGH
Description:
This signature detects attempts to exploit a known remote file inclusion vulnerability in the VirtualSystem VS-News-System. It is due to insufficient validation of user-supplied input in Show_News_Inc.php. A remote attacker can exploit this by enticing a target to open a malicious URL link. A successful attack can result in arbitrary code execution and loss of sensitive information.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:IE:SETCAPTURE-UAF1 - HTTP: Microsoft Internet Explorer SetCapture Use After Free1
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:IE:TIF-DND1 - HTTP: Internet Explorer TIF Drag and Drop Vulnerability1
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. Versions 5.01, 5.5, and 6.0 are vulnerable. Attackers can determine the user's username and enumerate the contents of the Temporary Internet Files folder.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
Severity: MEDIUM
Description:
This signature detects attempts to use unsafe ActiveX control in the Microsoft Agent library. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:JAVA:JAX-WS-RCE - HTTP: Oracle Java Applet JAX-WS Class Handling Arbitrary Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Oracle Java. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- oracle jre up to 1.7.0 (update3)
- oracle jre up to 1.7.0 (update5)
- oracle jre up to 1.7.0 (update6)
- oracle jdk up to 1.7.0 (update3)
- oracle jdk up to 1.7.0 (update5)
- oracle jdk up to 1.7.0 (update6)
- oracle jre up to 1.7.0 (update4)
- oracle jdk up to 1.7.0 (update1)
- oracle jdk up to 1.7.0 (update2)
- oracle jdk up to 1.7.0 (update4)
- oracle jre up to 1.7.0 (update1)
- oracle jre up to 1.7.0 (update2)
- oracle jdk up to 1.7.0 (update7)
- oracle jre up to 1.7.0 (update7)
HTTP:STC:ADOBE:CVE-2014-0493-C1 - HTTP: Adobe Acrobat and Reader CVE-2014-0493 Remote Code Execution1
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Acrobat and Reader. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Microsoft Internet Explorer. An attacker can create a malicious Web site containing Web Pages with dangerous headers, which if accessed by a user, allows the attacker to gain control of the user's client browser.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Internet Explorer 6.0
- Microsoft Internet Explorer 5.0.1
- Microsoft Internet Explorer 7.0
- Nortel Networks Contact Center NCC
- Nortel Networks Self-Service Peri Workstation
- Microsoft Internet Explorer 5.0.1 SP4
- Nortel Networks Self-Service MPS 100
- Nortel Networks Self-Service MPS 500
- Nortel Networks Self-Service MPS 1000
- Nortel Networks Self-Service Speech Server
- Nortel Networks Contact Center Multimedia & Outbound 6.0
- Microsoft Internet Explorer 6.0 SP1
- Nortel Networks CallPilot 703T
- Nortel Networks CallPilot 702T
- Microsoft Internet Explorer 5.0.1 For Windows 98
- Nortel Networks CallPilot 200I
- Microsoft Internet Explorer 5.0.1 For Windows 2000
- Microsoft Internet Explorer 5.0.1 SP2
- Microsoft Internet Explorer 5.0.1 For Windows 95
- Nortel Networks Self-Service Peri Application
- Nortel Networks CallPilot 1002Rp
- Microsoft Internet Explorer 5.0.1 For Windows NT 4.0
- Nortel Networks Contact Center Express
- Nortel Networks Contact Center Multimedia
- Nortel Networks CallPilot 201I
- Nortel Networks Contact Center Administration CCMA 7.0
- Nortel Networks Contact Center Administration CCMA 6.0
- Nortel Networks Contact Center Multimedia & Outbound 7.0
- Microsoft Internet Explorer 5.0.1 SP3
- Nortel Networks Multimedia Comm Mas
- Microsoft Internet Explorer 5.0.1 SP1
- Nortel Networks Contact Center Manager Server
Severity: HIGH
Description:
This signature detects attempts to use Garble Javascript obfuscation. Recent exploits leverage such obfuscation utilities to sneak under the network perimeter security appliances.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:CHROME:JS-MSGBOX-DOS1 - HTTP: Google Chrome Java Script Message Box Denial of Service1
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Google Chrome. A successful attack can result in a denial-of-service condition.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
HTTP:STC:JAVA:SHORT-COMPONENT - HTTP: Oracle Java Runtime Environment ShortComponentRaster.verify Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Oracle Java. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- oracle jdk up to 1.7.0 (update17)
- sun jdk 1.6.0 (update_10)
- oracle jdk up to 1.6.0 (update_38)
- oracle jre up to 1.7.0 (update7)
- sun jdk 1.5.0 (update29)
- oracle jre up to 1.6.0 (update_41)
- oracle jdk up to 1.7.0 (update3)
- sun jdk 1.5.0 (update14)
- sun jdk 1.6.0 (update_17)
- oracle jre up to 1.7.0 (update21)
- oracle jre up to 1.6.0 (update_35)
- oracle jdk up to 1.6.0 (update_45)
- sun jdk 1.6.0 (update_21)
- oracle jre up to 1.7.0 (update4)
- oracle jdk up to 1.7.0 (update6)
- oracle jdk up to 1.7.0 (update5)
- oracle jdk up to 1.7.0 (update9)
- oracle jdk up to 1.5.0 (update_41)
- oracle jre up to 1.6.0 (update_25)
- sun jdk 1.6.0 (update_15)
- oracle jdk up to 1.6.0 (update_31)
- sun jdk 1.5.0 (update25)
- sun jdk 1.5.0 (update1)
- oracle jre up to 1.7.0 (update2)
- sun jre 1.5.0 (update27)
- oracle jre up to 1.6.0 (update_32)
- oracle jre up to 1.6.0 (update_34)
- sun jdk 1.5.0 (update15)
- sun jdk 1.5.0 (update12)
- sun jre 1.6.0 (update_14)
- oracle jre up to 1.7.0 (update10)
- oracle jre up to 1.7.0 (update11)
- sun jdk 1.5.0 (update5)
- oracle jre up to 1.7.0 (update17)
- oracle jre up to 1.6.0 (update_33)
- sun jre 1.6.0 (update_11)
- oracle jre up to 1.6.0 (update_26)
- oracle jdk up to 1.7.0 (update11)
- oracle jre up to 1.5.0 (update_38)
- sun jre 1.6.0 (update_9)
- oracle jdk up to 1.5.0 (update_40)
- sun jdk 1.5.0 (update17)
- oracle jdk up to 1.6.0 (update_33)
- sun jdk 1.6.0 (update_11)
- oracle jre up to 1.6.0 (update_29)
- oracle jre up to 1.7.0 (update6)
- sun jre 1.5.0 (update8)
- sun jre 1.6.0 (update_4)
- sun jre 1.6.0 (update_3)
- oracle jdk up to 1.7.0 (update21)
- sun jre 1.5.0 (update28)
- oracle jre up to 1.6.0 (update_38)
- oracle jdk up to 1.6.0 (update_22)
- sun jdk 1.5.0 (update11)
- sun jdk 1.5.0 (update6)
- sun jdk 1.5.0 (update20)
- sun jdk 1.5.0 (update28)
- oracle jre up to 1.6.0 (update_23)
- oracle jre up to 1.6.0 (update_24)
- oracle jdk up to 1.7.0 (update13)
- sun jdk 1.6.0 (update_14)
- sun jre 1.6.0 (update_18)
- oracle jre up to 1.5.0 (update_36)
- oracle jre up to 1.5.0 (update_40)
- oracle jdk up to 1.7.0 (update10)
- sun jre 1.5.0 (update4)
- sun jdk 1.5.0 (update3)
- sun jdk 1.6.0 (update_7)
- sun jre 1.6.0 (update_13)
- sun jdk 1.5.0 (update9)
- oracle jdk up to 1.5.0 (update_38)
- sun jdk 1.5.0 (update2)
- sun jre 1.6.0 (update_10)
- sun jre 1.5.0 (update31)
- oracle jdk up to 1.6.0 (update_43)
- sun jre 1.5.0 (update26)
- sun jdk 1.5.0 (update26)
- sun jdk 1.6.0 (update1)
- sun jre 1.5.0 (update18)
- sun jdk 1.6.0 (update_12)
- oracle jdk up to 1.7.0 (update15)
- oracle jdk up to 1.7.0 (update2)
- oracle jdk up to 1.7.0 (update1)
- oracle jdk up to 1.6.0 (update_39)
- sun jre 1.5.0 (update3)
- sun jre 1.5.0 (update33)
- oracle jdk up to 1.6.0 (update_27)
- sun jre 1.5.0 (update1)
- sun jdk 1.5.0 (update23)
- oracle jre up to 1.6.0 (update_45)
- sun jre 1.6.0 (update_7)
- oracle jdk up to 1.7.0 (update4)
- oracle jre up to 1.7.0 (update9)
- sun jre 1.5.0 (update7)
- oracle jre up to 1.7.0 (update5)
- oracle jre up to 1.6.0 (update_31)
- sun jdk 1.5.0 (update24)
- oracle jre up to 1.5.0 (update_41)
- sun jre 1.6.0 (update_15)
- sun jre 1.6.0 (update_21)
- sun jre 1.5.0 (update10)
- sun jdk 1.6.0 (update_18)
- sun jre 1.5.0 (update25)
- sun jre 1.5.0 (update21)
- oracle jdk up to 1.6.0 (update_34)
- oracle jdk up to 1.5.0 (update_45)
- sun jre 1.6.0 (update_12)
- oracle jre up to 1.6.0 (update_27)
- oracle jre up to 1.7.0 (update3)
- oracle jdk up to 1.6.0 (update_26)
- oracle jdk up to 1.6.0 (update_29)
- oracle jre up to 1.6.0 (update_30)
- sun jre 1.6.0 (update_17)
- sun jdk 1.6.0 (update1_b06)
- oracle jdk up to 1.6.0 (update_23)
- sun jre 1.5.0 (update9)
- sun jdk 1.6.0 (update_19)
- sun jdk 1.6.0 (update_4)
- sun jdk 1.5.0 (update11_b03)
- sun jdk 1.5.0 (update31)
- sun jre 1.5.0 (update17)
- sun jre 1.6.0 (update_5)
- sun jdk 1.6.0 (update_16)
- sun jre 1.5.0 (update29)
- oracle jdk up to 1.6.0 (update_32)
- oracle jdk up to 1.6.0 (update_37)
- oracle jre up to 1.7.0 (update13)
- sun jdk 1.5.0 (update21)
- sun jdk 1.5.0 (update27)
- oracle jdk up to 1.5.0 (update_36)
- oracle jdk up to 1.6.0 (update_30)
- sun jre 1.5.0 (update15)
- sun jre 1.5.0 (update12)
- sun jre 1.5.0 (update5)
- sun jre 1.5.0 (update22)
- sun jre 1.5.0 (update23)
- oracle jre up to 1.6.0 (update_22)
- sun jdk 1.5.0 (update22)
- sun jdk 1.6.0 (update_20)
- sun jdk 1.5.0 (update7)
- sun jre 1.6.0 (update_19)
- oracle jre up to 1.7.0 (update15)
- sun jdk 1.5.0 (update8)
- sun jdk 1.5.0 (update7_b03)
- oracle jre up to 1.6.0 (update_39)
- sun jre 1.5.0 (update2)
- sun jdk 1.6.0 (update_5)
- sun jre 1.6.0 (update_16)
- sun jre 1.5.0 (update19)
- sun jre 1.5.0 (update16)
- oracle jdk up to 1.7.0 (update7)
- oracle jdk up to 1.6.0 (update_24)
- sun jdk 1.5.0 (update18)
- sun jdk 1.6.0 (update2)
- oracle jre up to 1.5.0 (update_39)
- sun jre 1.5.0 (update13)
- sun jdk 1.6.0 (update_6)
- sun jre 1.5.0 (update14)
- oracle jdk up to 1.5.0 (update_39)
- sun jre 1.6.0 (update_2)
- sun jre 1.6.0 (update_1)
- sun jdk 1.5.0 (update4)
- sun jre 1.6.0 (update_20)
- sun jdk 1.6.0 (update_13)
- sun jdk 1.6.0 (update_3)
- oracle jre up to 1.6.0 (update_43)
- sun jre 1.5.0 (update11)
- sun jre 1.5.0 (update6)
- oracle jdk up to 1.6.0 (update_25)
- sun jre 1.5.0 (update24)
- sun jre 1.5.0 (update20)
- sun jdk 1.5.0 (update13)
- sun jdk 1.5.0 (update10)
- sun jdk 1.5.0 (update19)
- sun jdk 1.5.0 (update16)
- oracle jre up to 1.7.0 (update1)
- oracle jdk up to 1.6.0 (update_41)
- oracle jre up to 1.6.0 (update_37)
- oracle jre up to 1.5.0 (update_45)
- sun jdk 1.5.0 (update33)
- sun jre 1.6.0 (update_6)
- oracle jdk up to 1.6.0 (update_35)
HTTP:STC:DL:GIMP-XWD-BO - HTTP: GIMP XWD File Handling Stack Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the GNU Image Manipulation Program (GIMP). A successful attack can lead to a buffer overflow and arbitrary remote code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
HTTP:STC:GIT-CLIENT-CE - HTTP: GitHub Git Tree Handling Overwrite Arbitrary Command Execution
Severity: MEDIUM
Description:
This signature attempts to detect a known vulnerability against GitHub. A successful exploit can lead to remote command execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
HTTP:STC:IE:OBJECT-TAG-XML1 - HTTP: Microsoft Internet Explorer Object Tag XML RCE1
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:SWF:OPENTYPE-FONT-OF1 - HTTP: Adobe Flash Player OpenType Font Parsing Integer Overflow1
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:IE:IESTYLE-OBJ - HTTP: Microsoft Internet Explorer Style Object Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application. Successful exploits will compromise the application and possibly the computer. Failed attacks can cause denial-of-service conditions.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Internet Explorer 6.0
- Microsoft Internet Explorer 6.0 SP1
- Microsoft Internet Explorer 7.0
- Nortel Networks Self-Service Peri Workstation
- Nortel Networks Media Processing Svr 100
- Nortel Networks Contact Center Multimedia & Outbound 6.0
- Nortel Networks Self-Service Speech Server
- Nortel Networks CallPilot 1005R
- Nortel Networks CallPilot 600R
- Nortel Networks CallPilot 703T
- Nortel Networks Media Processing Server
- Nortel Networks CallPilot 201I
- Nortel Networks CallPilot 200I
- Nortel Networks CallPilot 702T
- Nortel Networks Self-Service Peri Application
- Nortel Networks CallPilot 1002Rp
- Nortel Networks CallPilot 202I
- Nortel Networks Contact Center Express
- Nortel Networks Contact Center Multimedia
- Nortel Networks Contact Center Administration CCMA 7.0
- Nortel Networks Contact Center Administration CCMA 6.0
- Nortel Networks Contact Center Multimedia & Outbound 7.0
- Nortel Networks Contact Center Administration
- Nortel Networks Media Processing Svr 1000 Rel 3.0
- Nortel Networks Media Processing Svr 500 Rel 3.0
- Nortel Networks Self-Service Media Processing Server
- Nortel Networks Multimedia Comm Mas
HTTP:STC:DL:MSPUBLISHER-OBJ - HTTP: Microsoft Publisher Object Handler Validation Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Publisher. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Publisher 2007 SP1
- Microsoft Publisher 2007
- Microsoft Publisher 2003 SP3
- Microsoft Publisher 2002 SP3
- Microsoft Publisher 2003 SP2
- Microsoft Publisher 2000 SP3
HTTP:ORACLE:JNLP-CODE-EXEC - HTTP: Oracle Sun Java JRE Arbitrary Code Execution
Severity: HIGH
Description:
This signature detects an attempt to exploit a security restriction bypass vulnerability against Oracle JRE. Successful exploitation could allow an attacker to execute arbitrary codes through crafting a malicious JNLP file which could lead to further attacks.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Oracle Java. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
HTTP:STC:DL:OO-EMF - HTTP: OpenOffice EMF File EMR_BITBLT Record Integer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in OpenOffice. A successful attack can lead to a integer overflow and arbitrary remote code execution within the context of the user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- OpenOffice 1.1.5
- OpenOffice 2.0.3
- Red Hat Enterprise Linux Desktop 5 Client
- Ubuntu Ubuntu Linux 6.06 LTS Powerpc
- Ubuntu Ubuntu Linux 6.06 LTS I386
- Ubuntu Ubuntu Linux 6.06 LTS Amd64
- OpenOffice 2.2.1
- OpenOffice 2.3.0
- Red Hat Desktop 3.0.0
- Ubuntu Ubuntu Linux 7.10 Lpia
- OpenOffice 2.2.0
- SuSE openSUSE 10.2
- OpenOffice 1.0.2
- SuSE openSUSE 10.3
- SuSE Linux 10.1 X86
- SuSE Linux 10.1 X86-64
- SuSE Linux 10.1 Ppc
- Red Hat Desktop 4.0.0
- OpenOffice 1.0.1
- Sun StarOffice 8.0
- Sun StarOffice 8 Update 7
- Red Hat Enterprise Linux Optional Productivity Application 5 Server
- Sun StarOffice 7.0 PP10
- Avaya Interactive Response 2.0
- OpenOffice 2.2
- Mandriva Linux Mandrake 2008.0
- Mandriva Linux Mandrake 2008.0 X86 64
- Sun StarOffice 7.0.0
- Red Hat Fedora 7
- Ubuntu Ubuntu Linux 7.10 I386
- Ubuntu Ubuntu Linux 7.10 Powerpc
- Ubuntu Ubuntu Linux 7.10 Sparc
- OpenOffice 2.0.4
- Debian Linux 3.1.0 Amd64
- Debian Linux 3.1.0
- Debian Linux 3.1.0 Alpha
- Debian Linux 3.1.0 Arm
- Debian Linux 3.1.0 Hppa
- Debian Linux 3.1.0 Ia-32
- Debian Linux 3.1.0 Ia-64
- Debian Linux 3.1.0 M68k
- Debian Linux 3.1.0 Mips
- Debian Linux 3.1.0 Mipsel
- Debian Linux 3.1.0 Ppc
- Debian Linux 3.1.0 S/390
- Debian Linux 3.1.0 Sparc
- OpenOffice 2.3.1
- OpenOffice 1.1.2
- Red Hat Enterprise Linux AS 3
- Red Hat Enterprise Linux ES 3
- Red Hat Enterprise Linux WS 3
- OpenOffice 1.1.4
- Avaya Interactive Response 3.0
- Mandriva Corporate Server 3.0.0
- Sun StarOffice 8 Update 6
- Sun StarOffice 7.0 PP9
- Ubuntu Ubuntu Linux 7.04 Amd64
- Ubuntu Ubuntu Linux 7.04 I386
- OpenOffice 2.0.2
- Ubuntu Ubuntu Linux 7.04 Sparc
- SuSE Novell Linux Desktop 9.0.0
- Red Hat Fedora 8
- Gentoo Linux
- Ubuntu Ubuntu Linux 7.10 Amd64
- Debian Linux 4.0 Alpha
- Debian Linux 4.0 Amd64
- Debian Linux 4.0 Arm
- Debian Linux 4.0 Hppa
- Debian Linux 4.0 Ia-32
- Debian Linux 4.0 Ia-64
- Debian Linux 4.0 M68k
- Debian Linux 4.0 Mips
- Debian Linux 4.0 Mipsel
- Debian Linux 4.0 Powerpc
- Debian Linux 4.0 S/390
- Debian Linux 4.0 Sparc
- Debian Linux 4.0
- OpenOffice 2.0.0 Beta
- OpenOffice 2.1
- OpenOffice 1.1.1
- OpenOffice 1.0.3
- OpenOffice 1.1.51
- OpenOffice 1.1.52
- Red Hat Enterprise Linux AS 4
- Red Hat Enterprise Linux ES 4
- Red Hat Enterprise Linux WS 4
- OpenOffice 2.0.3-1
- Ubuntu Ubuntu Linux 7.04 Powerpc
- OpenOffice 2.0.1
- Ubuntu Ubuntu Linux 6.06 LTS Sparc
- SuSE SUSE Linux Enterprise SDK 10.SP1
- SuSE SUSE Linux Enterprise Desktop 10 SP1
- Mandriva Corporate Server 3.0.0 X86 64
- OpenOffice 1.1.3
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against the Microsoft Office FlashPix Graphics filter. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
HTTP:STC:IMG:JPEG:WIN-COLOR1 - HTTP: Microsoft Windows Color Management Module Buffer Overflow1
Severity: MEDIUM
Description:
This signature detects a known vulnerability in Microsoft Windows Color Management Module. An attacker can create a Web site containing Web pages with dangerous image files, which if accessed by a victim, allows the attacker to gain control of the victim's computer.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the eXeScope version 6.50. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
HTTP:STC:IE:URL-FILE-BOF1 - HTTP: Microsoft Windows Explorer Invalid URL File1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability in the handling of url files in Microsoft Windows. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:ADOBE:READER-U3D - HTTP: Adobe Reader U3D ShadingModifierBlock Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Reader. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Red Hat Desktop Extras 4
- Adobe Reader 9.4.5
- Adobe Acrobat 9.3.4
- Red Hat Enterprise Linux Supplementary 5 Server
- Red Hat Enterprise Linux Desktop Supplementary 6
- Red Hat Enterprise Linux Server Supplementary 6
- Red Hat Enterprise Linux Workstation Supplementary 6
- Adobe Acrobat Professional 9.1.2
- Adobe Acrobat 9.3.4
- Adobe Acrobat 10.0.1
- Adobe Acrobat 9.4.2
- Adobe Acrobat Professional 10.0.1
- Adobe Acrobat Professional 9.4.2
- Adobe Acrobat Standard 10.0.1
- Adobe Acrobat Standard 9.4.2
- Adobe Reader 10.0.1
- Adobe Reader 9.4.2
- Adobe Acrobat Standard 9.3
- Adobe Acrobat 9.3
- Adobe Reader 9.3
- Adobe Acrobat Professional 9.3
- SuSE SUSE Linux Enterprise Desktop 10 SP4
- Adobe Reader 9.2
- Adobe Acrobat Professional 9.2
- Adobe Acrobat Standard 9.2
- Red Hat Enterprise Linux Extras 4
- Adobe Acrobat 9.3.3
- SuSE openSUSE 11.4
- Adobe Acrobat 9.4.1
- Adobe Acrobat Professional 9.4.1
- Adobe Acrobat Standard 9.4.1
- Adobe Reader 9.4.1
- Adobe Reader 9.3.2
- Adobe Acrobat Standard 9.3.2
- Adobe Acrobat Professional 9.3.2
- Adobe Acrobat 9.3.2
- Adobe Reader 9
- Adobe Reader 9.4
- Adobe Reader 9.1.2
- Adobe Acrobat Standard 9.1.2
- Adobe Acrobat 9.1.1
- Adobe Acrobat Standard 9.4.5
- Adobe Acrobat Standard 9.4
- Adobe Acrobat Professional 9.4
- Adobe Acrobat Standard 9.3.4
- Adobe Acrobat Professional 9.3.4
- Adobe Reader 9.3.4
- Adobe Acrobat Standard 9.3.4
- Adobe Reader 9.3.4
- Adobe Acrobat Standard 9.4.3
- Adobe Acrobat 10.1.1
- Adobe Acrobat Professional 10.1.1
- Adobe Acrobat Standard 10.1.1
- Adobe Reader 10.1.1
- Adobe Acrobat 9.4.6
- Adobe Acrobat 9.4.4
- Adobe Acrobat Professional 9.4.6
- Adobe Acrobat 9.4.5
- Adobe Acrobat Standard 9.4.6
- Adobe Reader 9.4.6
- Adobe Reader 9.1
- Adobe Acrobat Professional 9.1
- Adobe Acrobat Standard 9.1
- Adobe Reader 9.3.3
- Adobe Acrobat 9.3.3
- Adobe Acrobat Professional 9.3.3
- Adobe Acrobat Standard 9.3.3
- Adobe Reader 9.3.1
- Adobe Acrobat Professional 9.3.1
- Adobe Acrobat Standard 9.3.1
- Adobe Reader 9.1.1
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- SuSE SUSE Linux Enterprise Desktop 11 SP1
- Adobe Reader 9.1.3
- Adobe Acrobat Professional 9.1.3
- Adobe Acrobat Standard 9.1.3
- Gentoo Linux
- Adobe Acrobat 9
- Adobe Acrobat 10.0.3
- Adobe Acrobat Professional 10.0.3
- Adobe Acrobat Standard 10.0.3
- Adobe Reader 10.0.3
- Adobe Reader 9.4.3
- Adobe Reader 9.4.4
- Adobe Acrobat 9.4
- Adobe Acrobat Standard 9.4.4
- Adobe Acrobat Professional 9.4.3
- Adobe Acrobat Professional 9.4.4
- Adobe Acrobat 9.4.3
- SuSE openSUSE 11.3
- Adobe Acrobat 9.3.1
- Adobe Acrobat 10.0.2
- Adobe Acrobat Professional 10.0.2
- Adobe Acrobat Standard 10.0.2
- Adobe Reader 10.0.2
- Red Hat Enterprise Linux WS Extras 4
- Adobe Acrobat 10.1
- Adobe Acrobat Professional 10.1
- Adobe Acrobat Standard 10.1
- Adobe Reader 10.1
- Adobe Acrobat 10.0
- Adobe Acrobat Professional 10.0
- Adobe Reader 10.0
- Adobe Acrobat Professional 9.4.5
- Adobe Acrobat 9.2
- Red Hat Enterprise Linux ES Extras 4
- Red Hat Enterprise Linux AS Extras 4
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability agains Microsoft Word file format document parser. A successful attack can lead to arbitrary remote code execution within the context of the user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
HTTP:STC:SWF:SHARED-OBJ-UAF - HTTP: Adobe Flash Player SharedObject Use After Free
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Adobe Flash Player. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted application.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- adobe adobe_air 3.0.0.4080
- adobe flash_player 11.6.602.171
- adobe adobe_air_sdk 3.9.0.1030
- adobe adobe_air 2.6.0.19120
- adobe adobe_air_sdk 3.6.0.6090
- adobe flash_player 11.1.111.50
- adobe flash_player 11.8.800.94
- adobe flash_player 11.5.502.149
- adobe flash_player 11.1.111.8
- adobe flash_player 11.7.700.232
- adobe adobe_air 2.0.3.13070
- adobe flash_player 11.2.202.236
- adobe flash_player 11.1.111.54
- adobe flash_player 12.0.0.44
- adobe flash_player 11.1.102.62
- adobe flash_player 11.5.502.110
- adobe adobe_air 3.8.0.910
- adobe flash_player 11.1.115.54
- adobe adobe_air 1.0.1
- adobe adobe_air 3.0.0.408
- adobe adobe_air 2.0.3
- adobe adobe_air 2.7.0.1953
- adobe flash_player 11.3.300.270
- adobe flash_player 11.2.202.275
- adobe adobe_air_sdk 3.7.0.1860
- adobe adobe_air 3.9.0.1030
- adobe adobe_air 3.1.0.485
- adobe adobe_air 2.7.1
- adobe flash_player 11.2.202.273
- adobe adobe_air 2.6.0.19140
- adobe flash_player 11.7.700.252
- adobe flash_player 11.1.111.44
- adobe flash_player 11.1
- adobe adobe_air 2.5.0.16600
- adobe flash_player 11.9.900.170
- adobe flash_player 11.2.202.327
- adobe flash_player 11.3.300.265
- adobe flash_player 11.4.402.287
- adobe flash_player 11.2.202.261
- adobe adobe_air_sdk 3.0.0.4080
- adobe flash_player 11.1.115.7
- adobe adobe_air 3.6.0.6090
- adobe flash_player 11.7.700.242
- adobe adobe_air_sdk 3.3.0.3650
- adobe adobe_air 2.7
- adobe adobe_air_sdk 3.3.0.3690
- adobe adobe_air_sdk 3.5.0.600
- adobe adobe_air 1.1.0.5790
- adobe adobe_air_sdk 3.4.0.2710
- adobe adobe_air_sdk 3.7.0.1530
- adobe flash_player 11.2.202.336
- adobe adobe_air_sdk 4.0.0.1390
- adobe adobe_air_sdk 3.4.0.2540
- adobe adobe_air 3.7.0.1860
- adobe adobe_air 1.5.3
- adobe flash_player 11.1.115.58
- adobe flash_player 11.2.202.280
- adobe flash_player 11.6.602.168
- adobe adobe_air 3.5.0.600
- adobe flash_player 12.0.0.38
- adobe adobe_air 3.4.0.2710
- adobe adobe_air 1.5.1
- adobe adobe_air 1.1
- adobe flash_player 11.7.700.224
- adobe flash_player 11.1.115.48
- adobe adobe_air 4.0.0.1390
- adobe flash_player 11.4.402.278
- adobe adobe_air_sdk 3.8.0.1430
- adobe adobe_air 3.2.0.207
- adobe adobe_air_sdk 3.8.0.870
- adobe adobe_air 2.7.0.19480
- adobe adobe_air 3.9.0.1210
- adobe flash_player 11.2.202.258
- adobe flash_player 11.5.502.136
- adobe flash_player 11.0.1.153
- adobe flash_player 11.5.502.146
- adobe flash_player 11.7.700.261
- adobe flash_player 11.7.700.202
- adobe adobe_air_sdk 3.9.0.1210
- adobe flash_player 11.2.202.223
- adobe adobe_air 1.5.3.9120
- adobe flash_player 11.2.202.233
- adobe adobe_air 2.7.0.19530
- adobe flash_player 11.8.800.97
- adobe flash_player 11.9.900.152
- adobe adobe_air 2.0.4
- adobe adobe_air 3.8.0.870
- adobe flash_player 11.8.800.168
- adobe adobe_air 3.4.0.2540
- adobe adobe_air 3.2.0.2070
- adobe flash_player 11.1.102.63
- adobe flash_player 11.2.202.310
- adobe adobe_air_sdk 3.1.0.488
- adobe flash_player 11.2.202.235
- adobe adobe_air 3.3.0.3670
- adobe adobe_air 2.0.2.12610
- adobe flash_player 11.7.700.257
- adobe adobe_air 2.0.2
- adobe flash_player 12.0.0.43
- adobe flash_player 11.3.300.271
- adobe adobe_air 3.9.0.1380
- adobe adobe_air_sdk 3.2.0.2070
- adobe flash_player 11.2.202.332
- adobe flash_player 12.0.0.41
- adobe adobe_air 2.7.0.1948
- adobe adobe_air 3.9.0.1060
- adobe flash_player 11.7.700.169
- adobe flash_player 11.0
- adobe flash_player 11.2.202.291
- adobe adobe_air 2.5.1.17730
- adobe adobe_air_sdk 3.9.0.1380
- adobe adobe_air 3.1.0.488
- adobe adobe_air_sdk 3.5.0.880
- adobe flash_player 11.2.202.270
- adobe flash_player 11.1.115.34
- adobe adobe_air 1.5.0.7220
- adobe flash_player 11.1.102.55
- adobe flash_player 11.7.700.225
- adobe flash_player 11.3.300.262
- adobe adobe_air 3.7.0.2090
- adobe flash_player 11.9.900.117
- adobe adobe_air 2.6
- adobe adobe_air 1.5.1.8210
- adobe flash_player 11.2.202.262
- adobe flash_player 11.2.202.297
- adobe adobe_air 3.5.0.1060
- adobe adobe_air_sdk 3.6.0.599
- adobe adobe_air 1.5.2
- adobe adobe_air 3.5.0.880
- adobe flash_player 11.2.202.228
- adobe adobe_air_sdk 3.5.0.890
- adobe adobe_air_sdk 3.7.0.2090
- adobe adobe_air 1.5.3.9130
- adobe adobe_air 3.6.0.597
- adobe adobe_air 1.0.4990
- adobe flash_player 11.6.602.167
- adobe flash_player 11.2.202.335
- adobe flash_player 11.2.202.251
- adobe adobe_air 1.0
- adobe flash_player 11.3.300.268
- adobe flash_player 11.4.402.265
- adobe flash_player 11.1.102.59
- adobe adobe_air 1.5
- adobe adobe_air 3.1.0.4880
- adobe flash_player 11.2.202.285
- adobe flash_player 11.3.300.273
- adobe adobe_air 1.0.8.4990
- adobe flash_player 11.3.300.257
- adobe flash_player 11.5.502.135
- adobe adobe_air 3.5.0.890
- adobe flash_player 11.2.202.243
- adobe adobe_air 3.7.0.1530
- adobe flash_player 11.2.202.238
- adobe flash_player 11.6.602.180
- adobe adobe_air_sdk 3.5.0.1060
- adobe flash_player 11.7.700.260
- adobe flash_player 11.0.1.152
- adobe adobe_air 2.7.1.19610
- adobe adobe_air_sdk 3.8.0.910
HTTP:STC:DL:EMF-EMR-INT1 - HTTP: OpenOffice EMF File EMR Record Parsing Integer Overflow1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability in the OpenOffice EMF File EMR Record. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability in the VideoLAN VLC Media Player. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
HTTP:STC:DL:VISIO-VSD-MEM1 - HTTP: Microsoft Visio VSD File Format Memory Corruption Remote Code Execution1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Visio. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:DL:VISIO-OBJ-CONFUSIO1 - HTTP: Microsoft Visio Object Type Confusion Remote Code Execution1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Visio. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:DL:REAL-SWF-BOF1 - HTTP: RealPlayer SWF Flash File Buffer Overflow1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability in RealNetworks RealPlayer. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
HTTP:STC:DL:QUO-ESIGNAL-BOF - HTTP: Interactive Data eSignal Stack Buffer Overflow
Severity: HIGH
Description:
A stack buffer overflow vulnerability exists in Interactive Data eSignal. The vulnerability is due insufficient validation of string lengths when copying input into a fixed size stack buffer in certain file types. A remote attacker could exploit this vulnerability by enticing the user to open a maliciously crafted file. Successful exploitation would lead to execution of arbitrary code in the security context of the target user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- interactivedata esignal 10.6
- interactivedata esignal up to 10.6.2425
HTTP:STC:DL:MAL-MIC-BICLRUSED - HTTP: Windows Graphics Rendering Engine MIC File Malformed biClrUsed Parameter
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft's Graphics Rendering Engine. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Windows XP Media Center Edition SP2
- Microsoft Windows XP Professional
- Microsoft Windows 2000 Professional SP3
- Microsoft Windows Vista SP1
- Microsoft Windows XP 64-bit Edition SP1
- Microsoft Windows Vista Home Premium SP2
- Microsoft Windows Vista SP2
- Microsoft Windows Vista Ultimate 64-bit edition SP2
- Microsoft Windows Vista Ultimate SP2
- Avaya Communication Server 1000 Telephony Manager 3.0
- Avaya Communication Server 1000 Telephony Manager 4.0
- Avaya Messaging Application Server 5.2
- Avaya Aura Conferencing 6.0.0 Standard
- Microsoft Windows Server 2008 for 32-bit Systems SP2
- Microsoft Windows 2000 Professional
- Microsoft Windows Server 2008 for Itanium-based Systems SP2
- Microsoft Windows Server 2008 for x64-based Systems SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows XP Media Center Edition SP1
- Microsoft Windows 2000 Professional SP4
- Microsoft Windows Server 2003 x64 SP2
- Microsoft Windows XP Media Center Edition
- Microsoft Windows Vista Ultimate
- Avaya Meeting Exchange - Client Registration Server
- Avaya Meeting Exchange - Recording Server
- Avaya Meeting Exchange - Streaming Server
- Avaya Meeting Exchange - Web Conferencing Server
- Avaya Meeting Exchange - Webportal
- Microsoft Windows XP 64-bit Edition
- Avaya Messaging Application Server 4
- Avaya Messaging Application Server 5
- Microsoft Windows XP Home SP1
- Microsoft Windows XP Professional SP1
- Microsoft Windows Server 2003 SP1
- Microsoft Windows Server 2003 SP2
- Microsoft Windows XP Professional SP3
- Microsoft Windows XP Media Center Edition SP3
- Microsoft Windows XP Home SP3
- Microsoft Windows Vista Home Premium SP1
- Microsoft Windows Vista Ultimate SP1
- Microsoft Windows Vista Ultimate 64-bit edition
- Microsoft Windows XP Professional x64 Edition
- Microsoft Windows Vista Ultimate 64-bit edition SP1
- Microsoft Windows Server 2003 x64 SP1
- Microsoft Windows 2000 Professional SP2
- Avaya CallPilot 4.0
- Microsoft Windows XP Professional x64 Edition SP2
- Microsoft Windows Server 2003 Itanium
- Microsoft Windows Server 2003 Itanium SP1
- Microsoft Windows Server 2003 Itanium SP2
- Avaya CallPilot 5.0
- Microsoft Windows Server 2008 for 32-bit Systems
- Microsoft Windows Server 2008 for x64-based Systems
- Microsoft Windows Server 2008 for Itanium-based Systems
- Microsoft Windows XP Home SP2
- Microsoft Windows XP Professional SP2
- Microsoft Windows XP
HTTP:STC:HTML-ENT-ENCD-SCRIPT - HTTP: HTML Entity Encoded Script Language Declaration Detected
Severity: MEDIUM
Description:
This signature detects HTML entity encoded script language declaration.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
HTTP:STC:DL:QT-FPX-IO1 - HTTP: Apple QuickTime FPX File Integer Overflow1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability in QuickTime FPX file parser. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
HTTP:STC:ACTIVEX:HTML-EE-OBJ - HTTP: HTML Entity Encoded ActiveX Object Instantiation Detected
Severity: MEDIUM
Description:
This signature detects HTML entity encoded ActiveX object instantiation.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
HTTP:STC:DL:MAL-WRI - HTTP: Microsoft WordPad Malicious File
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against the Microsoft Word Document Convertor. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Windows XP Media Center Edition SP2
- Microsoft Windows XP Home
- Microsoft Windows XP
- Microsoft Windows XP 64-bit Edition SP1
- Microsoft Windows Server 2003 Enterprise Edition Itanium
- Microsoft Windows XP Tablet PC Edition SP2
- Avaya Messaging Application Server
- Avaya Messaging Application Server MM 3.0
- Avaya Messaging Application Server MM 3.1
- Microsoft Windows Server 2003 x64 SP2
- Microsoft Windows XP Media Center Edition
- Microsoft Windows XP Tablet PC Edition
- Avaya Messaging Application Server MM 1.1
- Microsoft Windows XP Home SP1
- Avaya Meeting Exchange - Client Registration Server
- Avaya Meeting Exchange - Recording Server
- Avaya Meeting Exchange - Streaming Server
- Avaya Meeting Exchange - Web Conferencing Server
- Avaya CallPilot Unified Messaging
- Microsoft Windows XP 64-bit Edition
- Avaya Messaging Application Server 4
- Avaya Messaging Application Server 5
- Microsoft Windows XP
- Microsoft Windows Server 2003 Enterprise x64 Edition
- Microsoft Windows XP Professional SP1
- Microsoft Windows Server 2003 SP1
- Microsoft Windows XP Tablet PC Edition SP3
- Microsoft Windows XP Professional x64 Edition SP3
- Microsoft Windows XP Professional SP3
- Microsoft Windows XP Media Center Edition SP3
- Microsoft Windows XP Home SP3
- Microsoft Windows Server 2003 Datacenter Edition SP1
- Microsoft Windows Server 2003 Datacenter Edition Itanium SP1
- Microsoft Windows Server 2003 Enterprise Edition Itanium SP1
- Microsoft Windows Server 2003 Enterprise Edition SP1
- Microsoft Windows Server 2003 Standard Edition SP1
- Microsoft Windows Server 2003 Web Edition SP1
- Microsoft Windows XP Professional x64 Edition
- Microsoft Windows Server 2003 x64 SP1
- Microsoft Windows Server 2003 SP2
- Microsoft Windows Server 2003 Standard Edition
- Microsoft Windows XP Professional
- Avaya Meeting Exchange - Webportal
- Microsoft Windows Server 2003 Datacenter Edition
- Microsoft Windows Server 2003 Web Edition
- Microsoft Windows Server 2003 Datacenter x64 Edition
- Microsoft Windows Server 2003 Web Edition SP2
- Microsoft Windows Server 2003 Datacenter Edition Itanium
- Microsoft Windows XP Professional x64 Edition SP2
- Microsoft Windows Server 2003 Itanium
- Microsoft Windows Server 2003 Itanium SP1
- Microsoft Windows Server 2003 Itanium SP2
- Microsoft Windows Server 2003 Datacenter x64 Edition SP2
- Microsoft Windows Server 2003 Enterprise x64 Edition SP2
- Microsoft Windows Server 2003 Standard Edition SP2
- Microsoft Windows Server 2003 Enterprise Edition
- Avaya Messaging Application Server MM 2.0
- Microsoft Windows XP Home SP2
- Microsoft Windows XP Professional SP2
- Microsoft Windows XP Tablet PC Edition SP1
- Microsoft Windows XP Media Center Edition SP1
Severity: HIGH
Description:
This signature detects the evasions attempts to detect adobe Flash file with SecureSwfLoader packer.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:DL:MS-WORD-BULLET - HTTP: Microsoft Word Bulleted List Handling Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Word. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- microsoft windows_xp (sp2)
- microsoft windows_server 2003 (sp2)
- microsoft windows_srv 2003 (-:x64)
- microsoft windows_srv 2003 (-)
- microsoft windows 2000 (sp4)
- microsoft windows_srv 2003 (sp2:itanium)
- microsoft windows_xp (sp2:pro_x64)
- microsoft windows_srv 2003 (sp1)
- microsoft windows_srv 2003 (sp1:itanium)
- microsoft windows_server 2003 (sp1)
- microsoft windows_srv 2003 (sp2:x64)
- microsoft office_word 2000 (sp3)
- microsoft office_word 2002 (sp3)
- microsoft windows_xp (:pro_x64)
- microsoft windows_xp (sp3)
- microsoft windows_srv 2003 (sp2)
HTTP:STC:DL:OFFICE-PICT-MC1 - HTTP: Microsoft Office PICT Filter Invalid Length Memory Corruption1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known flaw in Microsoft Office PICT Filter. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
Severity: MEDIUM
Description:
This signature detects malformed Microsoft Office Publisher Files. Microsoft Office Publisher is vulnerable to several file format exploits. A successful exploit can result in arbitrary remote code execution with the privileges of the targeted user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
HTTP:STC:DL:MS-PP-PRESENT-RCE1 - HTTP: Microsoft PowerPoint Presentation Handling Remote Code Execution1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft PowerPoint. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:DL:MS-OPEN-FONT-FILE - HTTP: Microsoft Windows OpenType Font File Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Windows handling of OpenType Font File. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- microsoft windows_server_2008 r2 (sp1:x64)
- microsoft windows_7 (sp1:x86)
- microsoft .net_framework 3.5.1
- microsoft windows_xp (sp3)
- microsoft .net_framework 4.0
- microsoft .net_framework 3.5 (sp1)
- microsoft windows_7 (sp1:x64)
- microsoft windows_server_2003 (sp2:x64)
- microsoft windows_server_2008 (sp2:x86)
- microsoft windows_rt -
- microsoft windows_8 - (-:x86)
- microsoft windows_server_2008 (sp2:itanium)
- microsoft windows_xp (sp2:professional)
- microsoft .net_framework 4.5
- microsoft windows_server_2003 (sp2:itanium)
- microsoft windows_server_2012 -
- microsoft windows_server_2008 (sp2:x64)
- microsoft windows_server_2008 r2 (sp1:itanium)
- microsoft windows_vista (sp2:x64)
- microsoft .net_framework 3.0 (sp2)
- microsoft windows_8 - (-:x64)
HTTP:STC:DL:MS-OBJ-PACKAGER-RC1 - HTTP: Microsoft Windows Object Packager ClickOnce Object Handling Code Execution1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Windows Object Packager. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:DL:XLS-MAL-OBJ - HTTP: Microsoft Office Excel Malformed Object Record Parsing Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Excel. A successful attack can lead to memory corruption and arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Excel 2000 SP3
- Microsoft Excel 2004 for Mac
- Microsoft Excel 2007
- Microsoft Office Compatibility Pack 2007 SP1
- Microsoft Excel 2000
- Microsoft Excel Compatibility Pack
- Microsoft Office Excel Viewer 2003 SP3
- Microsoft Excel 2000 SR1
- Microsoft Excel 2000 SP2
- Microsoft Excel 2002 SP1
- Microsoft Excel 2002 SP2
- Microsoft Excel 2008 for Mac
- Microsoft Excel 2007 SP1
- Microsoft Excel 2003 SP3
- Microsoft Excel 2003 SP1
- Microsoft Open XML File Format Converter for Mac
- Microsoft Office Compatibility Pack 2007
- Microsoft Excel 2002
- Microsoft Excel 2003 SP2
- Microsoft Excel 2007 SP2
- Microsoft Excel 2003
- Microsoft Office Compatibility Pack 2007 SP2
- Microsoft Excel 2002 SP3
- Microsoft Excel Viewer
- Microsoft Excel Viewer SP3
- Microsoft Excel 2000
- Microsoft Office Excel Viewer 2003
HTTP:STC:DL:MS-DOC-STREAM-CE1 - HTTP: Microsoft Word Document Stream Handling Code Execution1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Office Word. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Windows MPEG-4. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
HTTP:STC:DL:XLS-PIC-REC-MC - HTTP: Microsoft Office Excel Crafted Picture Record Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Microsoft Office Excel. It is due to improper handling of a crafted Excel spreadsheet file.A successful attack can lead to memory corruption and arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Excel 2000 SP3
- Microsoft Office Excel Viewer 2003
- Microsoft Excel 2007
- Microsoft Office Compatibility Pack 2007 SP1
- Microsoft Excel 2002 SP3
- Microsoft Excel Viewer
- Microsoft Office 2004 for Mac
- Microsoft Excel 2007 SP1
- Microsoft Excel 2003 SP3
- Microsoft Office Excel Viewer 2003 SP3
- Microsoft Office Compatibility Pack 2007
- Microsoft Office 2008 for Mac
HTTP:STC:DL:LIBXML2-ENTRY-NAME1 - HTTP: libxml2 XML File Processing Long Entity Name Buffer Overflow1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability in libxml2 XML library. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
Severity: MEDIUM
Description:
This signature detects scripts obfuscated (made unclear) with JavaScript. This is a technique commonly used by malicious Web sites to hide the malicious nature of the Web pages being downloaded by a user. A successful attack allows the Web page creator to take control of the victim's system.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
HTTP:STC:DL:XLS-MAL-REC-MC - HTTP: Microsoft Office Excel Malformed Record Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Microsoft Office Excel products. It is due to manipulation of pointer values stored in record types Qsir. A successful attack can lead to memory corruption and arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Excel 2007
- Microsoft Office Compatibility Pack 2007 SP2
- Microsoft Office Compatibility Pack 2007 SP1
- Microsoft Excel Viewer
- Microsoft Office Compatibility Pack 2007
- Microsoft Excel 2007 SP1
- Microsoft Excel 2007 SP2
HTTP:STC:DL:DOCX-ACCESS-RCE1 - HTTP: Microsoft Word Access Violation Remote Code Execution1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability in Microsoft Word. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Oracle Java. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- oracle jre 1.8.0
- oracle jre 1.7.0
- oracle jdk 1.8.0
- oracle jdk 1.7.0
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Office Word. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Word Viewer 2003
- Microsoft Works Suite 2004
- Microsoft Works Suite 2005
- Microsoft Works Suite 2000
- Microsoft Word 2002 SP3
- Microsoft Works Suite 2006
- Microsoft Works Suite 2001
- Microsoft Works Suite 2002
- Microsoft Word 2002
- Microsoft Word 2002 SP2
- Microsoft Word 2003
- Microsoft Word 2002 SP1
- Microsoft Works Suite 2003
HTTP:STC:DL:ASF-DF1 - HTTP: ASF Header Parsing Invalid Free1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Windows Media ASF file format. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:JAVA:IBM-CLASS-RCE - HTTP: IBM Java package java.lang.class Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known flaw in IBM Java "java.lang.class" package. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- ibm java 1.4.2.13.11
- ibm smart_analytics_system_5600 7200
- ibm java up to 6.0.3.0
- ibm java 6.0.9.2
- ibm lotus_notes 8.5.2.0
- ibm java 1.4.2.13.8
- ibm lotus_domino 8.5.1.5
- tivoli_storage_productivity_center 5.0
- ibm lotus_domino 8.5.1
- ibm lotus_notes_traveler 8.0
- ibm lotus_domino 8.5.1.3
- ibm lotus_notes 8.5.3
- tivoli_storage_productivity_center 5.1.1
- ibm lotus_domino 8.5.1.1
- ibm java 1.4.2.13.4
- ibm lotus_notes 8.5
- ibm rational_host_on-demand 11.0.6.1
- ibm java 6.0.10.0
- ibm lotus_notes 8.5.1
- ibm java 5.0.0.0
- ibm lotus_notes_traveler 8.5.1.3
- ibm lotus_notes 8.5.1.3
- ibm java 1.4.2.13.6
- ibm lotus_notes 8.5.1.0
- ibm rational_host_on-demand 9.0.8.0
- ibm java 1.4.2.13.3
- ibm lotus_domino 8.5.2.4
- ibm lotus_notes_traveler 8.5.1.1
- ibm lotus_notes 8.5.1.1
- ibm lotus_notes 8.0.2.5
- ibm java up to 5.0.14.0
- ibm java 5.0.12.4
- ibm lotus_notes 8.5.2.2
- ibm lotus_notes 8.5.1.5
- ibm java 1.4.2.13.2
- ibm tivoli_monitoring 6.2.3.0
- ibm java 5.0.12.2
- ibm java 1.4.2
- ibm lotus_domino 8.5.2.0
- ibm java 5.0.13.0
- ibm lotus_notes_traveler 8.5.0.2
- ibm lotus_notes_traveler 8.0.1.3
- ibm tivoli_monitoring 6.2.3.2
- ibm java 5.0.12.0
- ibm lotus_domino 8.5.2.2
- ibm lotus_notes_traveler 8.5.0.0
- ibm java 5.0.11.2
- ibm tivoli_monitoring 6.2.1.4
- ibm rational_host_on-demand 10.0.10.0
- ibm lotus_notes 8.5.0.0
- ibm tivoli_monitoring 6.2.2.9
- ibm tivoli_monitoring 6.2.1.2
- ibm smart_analytics_system_5600_software -
- ibm lotus_domino 8.5.3.1
- ibm lotus_domino 8.0.2
- ibm tivoli_monitoring 6.2.1.0
- ibm websphere_real_time 2.0
- ibm java 7.0.3.0
- ibm lotus_domino 8.0.2.1
- ibm lotus_notes_traveler 8.5.3.1
- ibm lotus_notes 8.5.3.1
- ibm java 5.0.12.3
- ibm rational_host_on-demand 11.0.5.1
- ibm lotus_notes 8.0.2
- ibm lotus_domino 8.0.2.3
- ibm java 6.0.1.0
- ibm java up to 1.4.2.13.13
- ibm tivoli_monitoring 6.2.2.1
- tivoli_storage_productivity_center 5.1
- ibm lotus_notes 8.0.0
- ibm lotus_notes 8.0.2.1
- ibm lotus_notes 8.0.2.6
- ibm tivoli_monitoring 6.2.2.3
- ibm rational_change 4.7
- ibm lotus_notes 8.0.2.3
- ibm rational_host_on-demand 11.0.3.0
- ibm tivoli_monitoring 6.2.2.5
- ibm java 7.0.0.0
- ibm lotus_domino 8.5.0
- ibm java 6.0.9.0
- ibm tivoli_monitoring 6.2.2.7
- ibm lotus_notes_traveler 8.5.3.3 (interim_fix_1)
- ibm lotus_notes 8.5.0.1
- ibm tivoli_monitoring 6.2.0.3
- ibm tivoli_monitoring 6.1.0.7
- ibm lotus_notes_traveler 8.0.1.2
- ibm tivoli_monitoring 6.2.0.1
- ibm lotus_notes 8.0.2.0
- ibm java 1.4.2.13.10
- ibm lotus_domino 8.5.0.1
- ibm java 1.4.2.13.9
- ibm java 1.4.2.13
- ibm java 1.4.2.13.12
- ibm lotus_notes 8.5.4
- ibm lotus_notes 8.0
- ibm java 6.0.7.0
- ibm tivoli_remote_control 5.1.2
- ibm java 6.0.0.0
- ibm java 1.4.2.13.5
- ibm rational_host_on-demand 11.0.6.0
- ibm rational_change 5.2
- ibm rational_host_on-demand 1.6.0.12
- ibm lotus_domino 8.5.2.3
- ibm lotus_notes_traveler 8.5.1.2
- ibm lotus_notes 8.5.1.4
- ibm java 1.4.2.13.7
- ibm lotus_domino 8.0
- ibm lotus_notes 8.5.1.2
- ibm java 1.4.2.13.1
- ibm lotus_domino 8.5.1.2
- ibm java 7.0.1.0
- ibm rational_host_on-demand 11.0.4.0
- ibm lotus_notes 8.5.2.1
- ibm lotus_domino 8.5.1.4
- ibm java 6.0.8.1
- ibm tivoli_monitoring 6.2.3.1
- ibm java 5.0.12.5
- ibm service_delivery_manager 7.2.1.0
- ibm lotus_notes 8.5.2.3
- ibm lotus_notes_traveler 8.5.3
- ibm lotus_domino 8.5.2.1
- ibm lotus_notes_traveler 8.5.0.1
- ibm lotus_notes_sametime 8.0.80822
- ibm java 5.0.11.1
- ibm java 5.0.12.1
- ibm service_delivery_manager 7.2.2.0
- ibm java 6.0.2.0
- ibm tivoli_monitoring 6.2.2.8
- ibm tivoli_monitoring 6.2.1.3
- ibm tivoli_monitoring 6.2.1.1
- ibm tivoli_monitoring 6.2.3
- ibm lotus_domino 8.5.3.0
- ibm lotus_notes_sametime 8.5.1.20100709-1631 (:~~advanced_embedded~~~)
- ibm tivoli_monitoring 6.1.0
- ibm lotus_domino 8.0.1
- ibm lotus_domino 8.5.3.2
- ibm java up to 7.0.2.0
- ibm lotus_notes 8.0.2.4
- ibm lotus_notes_traveler 8.5.3.2
- ibm smart_analytics_system_5600_software 9.7
- ibm rational_host_on-demand 11.0.5.0
- ibm tivoli_monitoring 6.2.2.0
- ibm lotus_notes_traveler 8.0.1
- ibm lotus_notes 8.0.1
- ibm lotus_notes_sametime 8.0.80407
- ibm lotus_domino 8.0.2.2
- ibm websphere_real_time 3.0
- ibm lotus_notes 8.5.3.2
- ibm java 6.0.10.1
- ibm tivoli_monitoring 6.2.2.2
- ibm rational_change 5.1
- ibm lotus_domino 8.0.2.4
- ibm rational_host_on-demand 10.0.9.0
- ibm lotus_notes_traveler 8.5.2.1
- ibm rational_host_on-demand 8.0.8.0
- ibm tivoli_monitoring 6.2.2.4
- ibm rational_change 5.3
- ibm tivoli_monitoring 6.2.2
- ibm lotus_notes 8.0.2.2
- ibm tivoli_monitoring 6.2.2.6
- ibm tivoli_monitoring 6.2.0
- ibm tivoli_monitoring 6.2.0.2
- ibm tivoli_monitoring 6.2.1
- ibm java 6.0.9.1
- ibm java up to 6.0.11.0
- ibm java 6.0.8.0
HTTP:STC:DL:APPLE-QT-IMAGE-MC1 - HTTP: Apple QuickTime Image Description Atom Sign Extension Memory Corruption1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability in Apple QuickTime. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the current user.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:DOTNET-WINFORMS-RCE - HTTP: Microsoft .NET Framework WinForms Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Microsoft .NET Framework Windows Form. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- microsoft .net_framework 1.0 (sp3)
- microsoft .net_framework 1.1 (sp1)
- microsoft .net_framework 2.0 (sp2)
- microsoft .net_framework 4.0
- microsoft .net_framework 3.5.1
- microsoft .net_framework 4.5
- microsoft .net_framework 3.5
HTTP:STC:DL:APPLE-QT-FLIC-BO1 - HTTP: Apple QuickTime FLIC Animation File Buffer Overflow1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability in QuickTime FLIC Animation File handling function. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:DIRECTSHOW-AVI-EXEC1 - HTTP: Microsoft Windows DirectShow AVI File Code Execution1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Windows Media Player. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
HTTP:STC:DL:CISCO-WEBEX-ATDL - HTTP: Cisco WebEx Player ATDL2006.dll Heap Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Cisco WebEx Player. A successful attack can lead to a heap memory corruption and arbitrary remote code execution within the context of the affected application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- Cisco WebEx (Linux) 26.00
- Cisco WebEx (Linux) 27.00
- Cisco WebEx (Mac OS X) 26.00
- Cisco WebEx (Mac OS X) 27.00
- Cisco WebEx (Windows) 27.00
- Cisco WebEx (Windows) 26.00
- Cisco WebEx (Linux) 26.49.35
- Cisco WebEx (Linux) 27.11.8
- Cisco WebEx (Mac OS X) 27.11.8
- Cisco WebEx (Mac OS X) 26.49.35
- Cisco WebEx (Windows) 27.10.0
- Cisco WebEx (Windows) 26.49.32
- Cisco WebEx 27
- Cisco WebEx
- Cisco WebEx (Linux) 27LC SP22
- Cisco WebEx (Mac OS X) 27LC SP22
- Cisco WebEx (Windows) 27LC SP22
- Cisco WebEx (Linux) 27LB SP21 EP3
- Cisco WebEx (Mac OS X) 27LB SP21 EP3
- Cisco WebEx (Windows) 27LB SP21 EP3
HTTP:STC:DL:GIMP-XWD-BO1 - HTTP: GIMP XWD File Handling Stack Buffer Overflow1
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the GNU Image Manipulation Program (GIMP). A successful attack can lead to a buffer overflow and arbitrary remote code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:DL:GIMP-XWD-BO2 - HTTP: GIMP XWD File Handling Stack Buffer Overflow2
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the GNU Image Manipulation Program (GIMP). A successful attack can lead to a buffer overflow and arbitrary remote code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Reader. A successful attack can lead to unauthorized information disclosure.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Adobe Reader 7.0.4
- Adobe Reader 7.0.5
- Adobe Reader 7.0.6
- Adobe Reader 7.0.7
- Adobe Reader 7.0.8
- Adobe Reader 7.0.9
- Adobe Reader 6.0.3
- Adobe Reader 5.0.0
- Adobe Reader 5.0.5
- Adobe Reader 4.0.5 A
- Adobe Reader 4.0.0
- Adobe Reader 4.0.0 5
- Adobe Reader 4.0.0 5c
- Adobe Reader 7.0.3
- Adobe Reader 6.0.4
- Adobe Reader 5.0.10
- Adobe Reader 6.0.0
- Adobe Reader 8.0
- Adobe Reader 5.1.0
- Gentoo Linux
- Gentoo Linux 2007.0
- Adobe Reader 7.0.0
- Adobe Reader 7.0.1
- Adobe Reader 6.0.2
- Adobe Reader 6.0.1
- Adobe Reader 7.0.2
HTTP:STC:ADOBE:ACROBAT-GETICON - HTTP: Adobe Acrobat JavaScript getIcon Method Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Adobe Acrobat. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the Server.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Adobe Acrobat Professional 7.0.7
- Adobe Reader 7.0.3
- Adobe Reader 7.0.4
- Adobe Reader 7.0.5
- Adobe Reader 7.0.6
- Adobe Reader 7.0.7
- Sun Solaris 10 Sparc
- Adobe Acrobat Professional 7.0.0
- SuSE SUSE Linux Enterprise Desktop 10 SP2
- SuSE openSUSE 11.0
- Nortel Networks Self-Service Peri Workstation
- Adobe Reader 8.1.2 Security Update 1
- Adobe Acrobat Professional 8.1.2 Security Update 1
- Adobe Acrobat Professional 7.0.9
- SuSE Linux Desktop 10
- Nortel Networks Self-Service MPS 1000
- Adobe Acrobat Professional 7.0.5
- SuSE SUSE Linux Enterprise Desktop 11
- Nortel Networks Self-Service Peri Application
- Adobe Reader 8.1
- Adobe Acrobat Professional 8.1
- Adobe Acrobat Standard 8.1
- Adobe Reader 7.0.9
- Gentoo Linux
- Adobe Acrobat Professional 7.1
- Adobe Reader 7.1
- Adobe Acrobat Standard 7.1
- SuSE Novell Linux Desktop 9.0.0
- SuSE openSUSE 10.3
- Adobe Acrobat Standard 8.1.1
- Adobe Acrobat Standard 8.1.2
- Adobe Acrobat Professional 8.1.2
- Adobe Reader 9
- Adobe Acrobat Standard 9
- Adobe Acrobat Professional 7.0.4
- Adobe Reader 8.0
- Adobe Acrobat Professional 8.0
- Adobe Acrobat Standard 8.0
- Adobe Acrobat Professional 9
- SuSE openSUSE 11.1
- Nortel Networks Self-Service - CCSS7
- Adobe Reader 7.0.0
- Adobe Reader 7.0.1
- Adobe Acrobat Standard 7.0.0
- Adobe Acrobat Standard 7.0.1
- Adobe Acrobat Standard 7.0.2
- Adobe Acrobat Standard 7.0.3
- Adobe Acrobat Standard 7.0.4
- Adobe Acrobat Standard 7.0.5
- Adobe Acrobat Standard 7.0.8
- Adobe Acrobat Standard 7.0.6
- Adobe Acrobat Standard 7.0.7
- Adobe Reader 7.0.2
- Adobe Acrobat Professional 7.0.1
- Adobe Acrobat Professional 7.0.2
- Adobe Acrobat Professional 7.0.3
- Adobe Reader 8.1.1
- Adobe Acrobat Professional 8.1.1
- Adobe Reader 7.0.8
- Adobe Acrobat Professional 7.0.6
- Adobe Reader 8.1.2
- Adobe Acrobat Professional 7.0.8
HTTP:STC:DL:XLS-SERIES-TYPE-RC1 - HTTP: Microsoft Excel Series Record Parsing Type Mismatch Remote Code Execution1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Excel. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:DL:XLS-RTWINDOW1 - HTTP: Microsoft Excel rtWindow1 Record Handling Code Execution1
Severity: MEDIUM
Description:
A memory corruption vulnerability exists in the way Microsoft Excel handles XLS files that contain invalid values within the rtWindow1 records. A remote attacker can exploit this vulnerability by persuading a target user to open a specially crafted XLS file, potentially causing arbitrary code to be injected and executed in the security context of the logged in user. An attack targeting this vulnerability can result in the injection and execution of code. If code execution is successful, the behaviour of the target will depend on the intention of the attacker. Any code injected will be executed within the security context of the currently logged in user. In the case of an unsuccessful code execution attack, Excel will terminate resulting in the loss of any unsaved data from the current session.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:ADOBE:U3D-CLODMESH-MC - HTTP: Adobe Acrobat Reader U3D CLODMeshDeclaration Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Acrobat and Reader. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Red Hat Desktop Extras 4
- Red Hat Desktop Extras 3
- Sun Solaris 10 Sparc
- Red Hat Enterprise Linux Supplementary 5 Server
- Adobe Reader 9.1.2
- Adobe Acrobat Standard 9.1.2
- Adobe Acrobat Professional 8.1.6
- Adobe Acrobat Professional 9.1.2
- Adobe Acrobat Standard 8.1.6
- Adobe Reader 8.1.6
- Adobe Reader 7.1.3
- Adobe Acrobat Standard 7.1.3
- Adobe Acrobat Professional 7.1.3
- Adobe Reader 7.0.9
- Adobe Acrobat Professional 7.1
- Adobe Reader 7.1
- Adobe Acrobat Standard 7.1
- SuSE openSUSE 10.3
- Adobe Reader 8.1.3
- Adobe Reader 9
- Adobe Acrobat Standard 9
- Adobe Acrobat Standard 8.1.3
- Adobe Reader 8.0
- Adobe Acrobat Professional 8.0
- Adobe Acrobat Standard 8.0
- Adobe Acrobat Professional 8.1.3
- Adobe Acrobat 3D 8.1.3
- Adobe Acrobat 3D 8.1.2
- Adobe Acrobat Professional 7.0.7
- Adobe Reader 7.0.4
- Adobe Reader 7.0.5
- Adobe Reader 7.0.6
- Adobe Reader 7.0.7
- Adobe Reader 7.0.8
- Adobe Acrobat 9.1.1
- SuSE SUSE Linux Enterprise Desktop 11
- Adobe Acrobat Standard 7.0.7
- Adobe Reader 8.1.1
- SuSE SUSE Linux Enterprise Desktop 10 SP3
- Adobe Acrobat Professional 8.1.1
- Adobe Reader 7.0.0
- Adobe Reader 7.0.1
- Adobe Acrobat Reader (UNIX) 7.0.0
- Adobe Acrobat 7.0.0
- Adobe Acrobat 7.0.1
- Adobe Acrobat 7.0.2
- Adobe Reader 7.0.2
- Adobe Reader 9.1
- Adobe Acrobat Professional 9.1
- Adobe Acrobat Standard 9.1
- SuSE openSUSE 11.0
- Adobe Reader 8.1.5
- Adobe Reader 9.1.1
- Adobe Reader 7.1.2
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Adobe Acrobat 7.0.3
- Adobe Reader 7.0.3
- Adobe Acrobat Reader (UNIX) 7.0.1
- Adobe Reader 9.1.3
- Adobe Acrobat Professional 9.1.3
- Adobe Acrobat Standard 9.1.3
- Gentoo Linux
- Adobe Acrobat Standard 7.0.0
- Adobe Acrobat Standard 7.0.1
- Adobe Acrobat Standard 7.0.2
- Adobe Acrobat Standard 7.0.3
- Adobe Acrobat Standard 7.0.4
- Adobe Acrobat Standard 7.0.5
- Adobe Acrobat Standard 7.0.8
- Adobe Acrobat Standard 7.0.6
- Adobe Acrobat 3D
- Adobe Acrobat Professional 7.0.0
- Adobe Acrobat Professional 7.0.1
- Adobe Acrobat Professional 7.0.2
- Adobe Acrobat Professional 7.0.3
- Adobe Acrobat Professional 7.0.4
- Adobe Acrobat Professional 7.0.5
- Adobe Acrobat Professional 7.0.6
- Adobe Reader 8.1.2
- Adobe Acrobat Professional 7.0.8
- Red Hat Enterprise Linux Extras 3
- Red Hat Enterprise Linux Extras 4
- SuSE SUSE Linux Enterprise Desktop 10 SP2
- Adobe Reader 8.1.2 Security Update 1
- Adobe Acrobat Professional 8.1.2 Security Update 1
- Adobe Acrobat Professional 7.0.9
- Adobe Reader 8.1
- Adobe Acrobat Professional 8.1
- Adobe Acrobat Standard 8.1
- Adobe Reader 7.1.1
- Adobe Reader 8.1.4
- Adobe Acrobat Professional 8.1.4
- Adobe Acrobat Professional 7.1.1
- Adobe Acrobat Standard 7.1.1
- Adobe Acrobat Standard 8.1.4
- Adobe Acrobat Standard 8.1.1
- Adobe Acrobat Standard 8.1.2
- Adobe Acrobat Professional 8.1.2
- Adobe Acrobat Professional 9
- SuSE openSUSE 11.1
- Red Hat Enterprise Linux AS Extras 3
- Red Hat Enterprise Linux ES Extras 3
- Red Hat Enterprise Linux WS Extras 3
- Red Hat Enterprise Linux WS Extras 4
- Red Hat Enterprise Linux ES Extras 4
- Red Hat Enterprise Linux AS Extras 4
HTTP:STC:DL:XLS-INT-OR1 - HTTP: Microsoft Excel Integer Overrun Vulnerability1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known issue with Microsoft Excel. A malformed Excel file, when opened, can result in arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:DL:MSSQL-BACKUP-MEM - HTTP: Microsoft SQL Server Backup Restoring Memory Corruption
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft SQL Server. A successful attack can lead to privilege escalation and arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Professional SP3
- Microsoft Windows 2000 Server SP3
- Microsoft Windows 2000 Advanced Server SP3
- Microsoft Windows 2000 Datacenter Server SP3
- Microsoft SQL Server 7.0 SP4
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Server SP1
- Microsoft SQL Server 2000 SP1
- Microsoft SQL Server 2000 SP4
- VMWare VirtualCenter 2.5 Update 4
- Microsoft SQL Server 2000 SP3
- Microsoft SQL Server 2005 SP1
- Microsoft SQL Server 7.0 SP1
- Microsoft SQL Server 7.0 SP2
- Microsoft SQL Server 2000 Itanium Edition SP4
- Microsoft Windows 2000 Professional
- Microsoft SQL Server 2005 Itanium Edition SP2
- Microsoft SQL Server 2005 Express Edition SP2
- Microsoft SQL Server 2005 x64 Edition SP2
- Microsoft SQL Server 2005 Express Edition with Advanced Serv SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Advanced Server SP1
- VMWare vCenter 4.0
- Microsoft SQL Server 2005 x64 Edition SP1
- Microsoft Windows 2000 Advanced Server SP4
- Microsoft Windows 2000 Datacenter Server SP4
- VMWare VirtualCenter 2.5 Update 1
- VMWare VirtualCenter 2.5 Update 2
- Microsoft Windows Internal Database (WYukon) x64 SP2
- Microsoft SQL Server 2000 Itanium Edition
- Microsoft SQL Server 2000 Itanium Edition SP1
- Microsoft SQL Server 2000 Itanium Edition SP2
- Microsoft SQL Server 2000 Itanium Edition SP3
- Microsoft SQL Server 2000 Desktop Engine SP3
- Microsoft SQL Server 2000 Desktop Engine SP2
- Microsoft SQL Server 2000 Desktop Engine SP1
- Microsoft Data Engine (MSDE) 1.0 SP3
- Microsoft Data Engine (MSDE) 1.0 SP2
- Microsoft Windows 2000 Server
- Microsoft Windows Internal Database (WYukon) SP1
- VMWare Vcenter Update Manager 4.0
- Microsoft Windows Internal Database (WYukon) x64 SP1
- VMWare VirtualCenter 2.5 Update 5
- Microsoft Data Engine (MSDE) 1.0 SP4
- Microsoft Data Engine (MSDE) 1.0
- Microsoft SQL Server 7.0
- Microsoft Data Engine (MSDE) 1.0 SP1
- VMWare vCenter 4.1
- VMWare Vcenter Update Manager 1.0
- Microsoft Windows Server 2003 Enterprise x64 Edition
- Microsoft Windows Internal Database (WYukon)
- Microsoft Windows Server 2003 SP2
- VMWare VirtualCenter 2.5 Update 6
- VMWare Vcenter Update Manager 4.1
- Microsoft SQL Server 2005 Itanium Edition SP1
- Microsoft Windows 2000 Server SP2
- Microsoft Windows Internal Database (WYukon) x64
- Microsoft SQL Server 2005 Express Edition SP1
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP4
- Microsoft SQL Server 2005 Express Edition with Advanced Serv SP1
- Microsoft Windows 2000 Server SP4
- VMWare VirtualCenter 2.5.Update 3 Build 11983
- VMWare VirtualCenter 2.5
- Microsoft SQL Server 2000 Desktop Engine SP4
- Microsoft SQL Server 2000 Desktop Engine
- Microsoft Windows Server 2008 for 32-bit Systems
- Microsoft Windows Server 2008 for x64-based Systems
- Microsoft SQL Server 2000
- Microsoft SQL Server 7.0 SP3
- Microsoft SQL Server 2005 SP2
- Microsoft Windows Server 2003 SP1
- Microsoft Windows Server 2003 Enterprise x64 Edition SP2
- Microsoft SQL Server 2000 SP2
- Microsoft Windows Internal Database (WYukon) SP2
HTTP:STC:IMG:JAVA-GIF-MEM - HTTP: Sun Java Runtime Environment GIF Parsing Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Sun Java Runtime Environment GIF. A successful attack can lead to a arbitrary remote code execution within the context of the affected application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- Apple Mac OS X 10.4.7
- Apple Mac OS X Server 10.4.7
- Debian Linux 5.0 Armel
- VMWare ESX Server 3.0.3
- Sun JRE (Windows Production Release) 1.4.2 12
- HP HP-UX 11.23.0
- Apple Mac OS X 10.5.4
- Apple Mac OS X Server 10.5.4
- Oracle JRockit R27.6.0-50 1.5.0 15
- Red Hat Enterprise Linux Extras 4
- Apple Mac OS X Server 10.6.3
- SuSE Open-Enterprise-Server
- Nortel Networks Self-Service WVADS
- Sun JRE (Linux Production Release) 1.3.1 08
- Sun JRE (Linux Production Release) 1.3.1 09
- Sun JRE (Linux Production Release) 1.4.2 01
- Sun JRE (Solaris Production Release) 1.3.1 08
- Sun JRE (Solaris Production Release) 1.3.1 09
- Sun JRE (Solaris Production Release) 1.4.2 01
- Sun JRE (Solaris Production Release) 1.4.2 02
- Sun JRE (Windows Production Release) 1.3.1 08
- Sun JRE (Windows Production Release) 1.3.1 09
- Sun JRE (Windows Production Release) 1.4.2 02
- VMWare VirtualCenter 2.5 Update 2
- Apple Mac OS X 10.4.6
- Apple Mac OS X Server 10.4.6
- SuSE SUSE Linux Enterprise Server 11 DEBUGINFO
- Apple Mac OS X 10.6.2
- Apple Mac OS X Server 10.6.2
- HP HP-UX 11.31
- Apple Mac OS X 10.4.10
- Apple Mac OS X Server 10.4.10
- Pardus Linux 2008
- SuSE SUSE Linux Enterprise Server 11
- Sun JRE (Linux Production Release) 1.6.0 07
- Sun JDK (Linux Production Release) 1.6.0 07
- Sun JRE (Linux Production Release) 1.5.0 16
- Sun JRE (Linux Production Release) 1.4.2 18
- Sun JRE (Solaris Production Release) 1.4.2 18
- Sun JRE (Windows Production Release) 1.4.2 18
- Sun JRE (Linux Production Release) 1.3.1 23
- Sun JRE (Solaris Production Release) 1.3.1 23
- Sun JRE (Windows Production Release) 1.3.1 23
- Sun SDK (Linux Production Release) 1.4.2 17
- Sun SDK (Linux Production Release) 1.4.2 18
- SuSE SUSE Linux Enterprise 11
- Sun SDK (Linux Production Release) 1.3.1 22
- SuSE Novell Linux POS 9
- Sun SDK (Solaris Production Release) 1.3.1 23
- Sun SDK (Solaris Production Release) 1.4.2 17
- Sun JRE (Windows Production Release) 1.1.8 005
- Sun JRE (Windows Production Release) 1.1.7 B 007
- Sun SDK (Windows Production Release) 1.3.1 22
- Sun JRE (Windows Production Release) 1.1.6 09
- Sun SDK (Windows Production Release) 1.3.1 23
- Sun SDK (Windows Production Release) 1.4.2 17
- Sun SDK (Windows Production Release) 1.4.2 18
- Sun JRE (Solaris Production Release) 1.1.8 12
- Sun JDK (Linux Production Release) 1.6.0 05
- Sun JRE (Linux Production Release) 1.6.0 05
- Sun JRE (Linux Production Release) 1.4.2 17
- Sun JRE (Solaris Production Release) 1.4.2 17
- Sun JRE (Windows Production Release) 1.4.2 17
- Sun JRE (Linux Production Release) 1.3.1 22
- Sun JRE (Solaris Production Release) 1.3.1 22
- Sun JRE (Windows Production Release) 1.3.1 22
- Sun JDK (Linux Production Release) 1.5.0 15
- Sun JDK (Linux Production Release) 1.6.0 06
- Sun JDK (Solaris Production Release) 1.5.0 15
- Sun JRE (Solaris Production Release) 1.5.0 15
- Sun JRE (Linux Production Release) 1.6.0 06
- Sun JDK (Linux Production Release) 1.5.0 14
- Apple Mac OS X Server 10.4.8
- Sun SDK (Linux Production Release) 1.3.1 23
- Sun JRE (Linux Production Release) 1.4.2 03
- Sun JRE (Solaris Production Release) 1.4.2 03
- Sun JRE (Windows Production Release) 1.4.2 03
- Sun SDK (Linux Production Release) 1.4.2 01
- Sun SDK (Linux Production Release) 1.4.2 03
- Sun JRE (Linux Production Release) 1.4.2 04
- Sun JRE (Solaris Production Release) 1.4.2 04
- Sun JRE (Windows Production Release) 1.4.2 04
- Sun SDK (Windows Production Release) 1.4.2 04
- Sun SDK (Linux Production Release) 1.4.2 04
- Sun SDK (Solaris Production Release) 1.4.2 04
- Sun SDK (Solaris Production Release) 1.4.2 03
- Sun SDK (Solaris Production Release) 1.4.2
- Sun SDK (Windows Production Release) 1.4.2
- Sun SDK (Windows Production Release) 1.4.2 03
- Sun JRE (Linux Production Release) 1.4.2 12
- Avaya CMS Server 15.0
- Sun SDK (Solaris Production Release) 1.2.2 05A
- Sun SDK (Solaris Production Release) 1.2.1
- Sun JRE (Solaris Production Release) 1.2.2 05A
- Sun JRE (Solaris Production Release) 1.2.1
- Sun JRE (Solaris Production Release) 1.1.8 10
- Sun JRE (Solaris Production Release) 1.1.7 B
- Sun JRE (Solaris Production Release) 1.1.6
- Sun SDK (Linux Production Release) 1.2.2 005
- Sun JRE (Linux Production Release) 1.2.2 005
- Apple Mac OS X 10.4.0
- Apple Mac OS X Server 10.4.0
- Sun JRE (Linux Production Release) 1.2.2
- Sun JRE (Linux Production Release) 1.3.1
- SuSE SUSE Linux Enterprise Server 10
- SuSE SUSE Linux Enterprise Server 9
- Apple Mac OS X Server 10.4.3
- Apple Mac OS X 10.4.3
- Sun SDK (Linux Production Release) 1.4.2 16
- Sun SDK (Solaris Production Release) 1.4.2 16
- Sun SDK (Windows Production Release) 1.4.2 16
- Sun SDK (Windows Production Release) 1.3.1 20
- Sun SDK (Linux Production Release) 1.3.1 20
- Sun JRE (Linux Production Release) 1.3.1 21
- Sun JRE (Solaris Production Release) 1.3.1 21
- Sun JRE (Windows Production Release) 1.3.1 21
- Sun SDK (Linux Production Release) 1.3.1 21
- Sun SDK (Solaris Production Release) 1.3.1 21
- Sun SDK (Windows Production Release) 1.3.1 21
- Sun JRE (Linux Production Release) 1.3.1 21
- VMWare Server 2.0
- Apple Mac OS X 10.5.5
- Apple Mac OS X Server 10.5.5
- Nortel Networks Enterprise Network Management System
- Sun SDK (Windows Production Release) 1.4.1 03
- SuSE SUSE Linux Enterprise Server 10 SP1
- Sun JRE (Linux Production Release) 1.3.1 18
- Sun JRE (Linux Production Release) 1.5.0 07
- Sun JRE (Linux Production Release) 1.3.1 19
- Sun JRE (Windows Production Release) 1.3.1 14
- Debian Linux 5.0 Alpha
- Sun JDK (Linux Production Release) 1.5.0 01
- Sun JDK (Linux Production Release) 1.5.0 02
- Red Hat Enterprise Linux WS Extras 4
- Red Hat Enterprise Linux ES Extras 4
- Red Hat Enterprise Linux AS Extras 4
- Red Hat Desktop Extras 4
- Sun SDK (Linux Production Release) 1.4.2 15
- Sun SDK (Solaris Production Release) 1.4.2 15
- Sun SDK (Windows Production Release) 1.4.2 15
- Sun JRE (Linux Production Release) 1.4.2 06
- Sun JRE (Windows Production Release) 1.4.2 06
- Sun JRE (Solaris Production Release) 1.4.2 06
- Sun SDK (Windows Production Release) 1.4.1 02
- Nortel Networks Self-Service MPS 500
- Nortel Networks Self-Service MPS 1000
- Nortel Networks Self-Service Speech Server
- Sun SDK (Linux Production Release) 1.4.0 .0 02
- Sun JRE (Linux Production Release) 1.3.1 16
- Sun JRE (Linux Production Release) 1.5.0 15
- Apple Mac OS X 10.5
- Apple Mac OS X 10.6
- Apple Mac OS X Server 10.6
- Sun JRE (Windows Production Release) 1.4.2 05
- Oracle JRockit R27.6.2
- Apple Mac OS X Server 10.4.1
- Sun JRE (Linux Production Release) 1.2.2 12
- Red Hat Network Satellite (for RHEL 5 Server) 5.3
- Sun SDK (Linux Production Release) 1.4.2 05
- Apple Mac OS X 10.6.3
- Sun JDK (Linux Production Release) 1.5.0 .0 05
- Sun JRE (Linux Production Release) 1.3.0 .0
- Sun JRE (Windows Production Release) 1.3.1 02
- Sun JRE (Solaris Production Release) 1.3.0
- Sun SDK (Windows Production Release) 1.3.0 .0 05
- Sun SDK (Linux Production Release) 1.3.1 08
- Sun SDK (Linux Production Release) 1.3.1 09
- Sun SDK (Linux Production Release) 1.3.1 10
- Sun SDK (Linux Production Release) 1.3.1 11
- Sun SDK (Linux Production Release) 1.3.1 12
- Sun SDK (Linux Production Release) 1.3.1 13
- Sun SDK (Linux Production Release) 1.3.1 14
- Sun SDK (Solaris Production Release) 1.3.1 08
- Sun SDK (Solaris Production Release) 1.3.1 09
- Sun SDK (Solaris Production Release) 1.3.1 10
- Sun SDK (Solaris Production Release) 1.3.1 11
- Sun SDK (Solaris Production Release) 1.3.1 12
- Sun SDK (Solaris Production Release) 1.3.1 13
- Sun SDK (Solaris Production Release) 1.3.1 14
- Sun SDK (Windows Production Release) 1.3.1 08
- Sun SDK (Windows Production Release) 1.3.1 09
- Sun SDK (Windows Production Release) 1.3.1 10
- Sun SDK (Windows Production Release) 1.3.1 11
- Sun SDK (Windows Production Release) 1.3.1 12
- Sun SDK (Windows Production Release) 1.3.1 13
- Sun SDK (Windows Production Release) 1.3.1 14
- Sun JRE (Linux Production Release) 1.3.1 10
- Sun JRE (Linux Production Release) 1.3.1 11
- Sun JRE (Linux Production Release) 1.3.1 13
- Sun JRE (Linux Production Release) 1.3.1 14
- Sun JRE (Solaris Production Release) 1.3.1 10
- Sun JRE (Solaris Production Release) 1.3.1 11
- Sun JRE (Solaris Production Release) 1.3.1 12
- Sun JRE (Solaris Production Release) 1.3.1 13
- Sun JRE (Solaris Production Release) 1.3.1 14
- Sun JRE (Windows Production Release) 1.3.1 10
- Sun JRE (Windows Production Release) 1.3.1 11
- Sun JRE (Windows Production Release) 1.3.1 12
- Sun JRE (Windows Production Release) 1.3.1 13
- Debian Linux 5.0
- Sun JRE (Linux Production Release) 1.3.1 12
- Debian Linux 5.0 Amd64
- Debian Linux 5.0 Arm
- Debian Linux 5.0 Hppa
- Debian Linux 5.0 Ia-32
- Debian Linux 5.0 Ia-64
- Debian Linux 5.0 M68k
- Debian Linux 5.0 Mips
- Debian Linux 5.0 Mipsel
- Debian Linux 5.0 Powerpc
- Debian Linux 5.0 S/390
- Debian Linux 5.0 Sparc
- Sun JRE (Solaris Production Release) 1.3.0 03
- Sun SDK (Solaris Production Release) 1.2.2 10
- Sun JRE (Linux Production Release) 1.3.0 .0 05
- Sun SDK (Solaris Production Release) 1.3.0
- Sun JRE (Linux Production Release) 1.6.0 10
- Sun SDK (Windows Production Release) 1.2.2 010
- Sun SDK (Solaris Production Release) 1.2.2 12
- Sun JRE (Linux Production Release) 1.4.2 15
- Sun JRE (Windows Production Release) 1.4.2 15
- Sun JRE (Solaris Production Release) 1.4.2 15
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Sun SDK (Linux Production Release) 1.2.2 12
- Apple Mac OS X Server 10.6.1
- Apple Mac OS X 10.6.1
- Sun SDK (Windows Production Release) 1.1.8 007
- Red Hat Enterprise Linux 5 Server
- Sun JRE (Solaris Production Release) 1.3.1 18
- Sun JRE (Windows Production Release) 1.3.1 18
- Sun JRE (Windows Production Release) 1.3.1 19
- Sun JRE (Solaris Production Release) 1.2.2 11
- Sun SDK (Linux Production Release) 1.4.2 09
- Sun SDK (Linux Production Release) 1.4.2 10
- Sun SDK (Linux Production Release) 1.4.2 11
- Sun SDK (Linux Production Release) 1.4.2 12
- Sun SDK (Linux Production Release) 1.4.2 13
- Sun SDK (Linux Production Release) 1.4.2 14
- Sun SDK (Solaris Production Release) 1.4.2 09
- Sun SDK (Solaris Production Release) 1.4.2 10
- Sun SDK (Solaris Production Release) 1.4.2 11
- Sun SDK (Solaris Production Release) 1.4.2 12
- Sun SDK (Solaris Production Release) 1.4.2 13
- Sun SDK (Solaris Production Release) 1.4.2 14
- Sun SDK (Windows Production Release) 1.4.2 09
- Sun SDK (Windows Production Release) 1.4.2 10
- Sun SDK (Windows Production Release) 1.4.2 11
- Sun SDK (Windows Production Release) 1.4.2 12
- Sun SDK (Windows Production Release) 1.4.2 13
- Sun SDK (Windows Production Release) 1.4.2 14
- Sun JRE (Windows Production Release) 1.4.2 07
- Sun JRE (Windows Production Release) 1.4.2 08
- Sun JRE (Windows Production Release) 1.4.2 09
- Sun JRE (Windows Production Release) 1.4.2 10
- Sun JRE (Windows Production Release) 1.4.2 11
- Sun JRE (Windows Production Release) 1.4.2 13
- Sun JRE (Windows Production Release) 1.4.2 14
- Sun JRE (Solaris Production Release) 1.4.2 07
- Sun JRE (Solaris Production Release) 1.4.2 08
- Sun JRE (Solaris Production Release) 1.4.2 09
- Sun JRE (Solaris Production Release) 1.4.2 10
- Sun JRE (Solaris Production Release) 1.4.2 11
- Sun JRE (Solaris Production Release) 1.4.2 13
- Sun JRE (Solaris Production Release) 1.4.2 14
- Sun JRE (Linux Production Release) 1.4.2 10
- Sun JRE (Linux Production Release) 1.4.2 11
- Sun JRE (Linux Production Release) 1.4.2 13
- Sun JRE (Linux Production Release) 1.4.2 14
- Sun SDK (Windows Production Release) 1.3.0 .0 02
- Sun JRE (Windows Production Release) 1.3.0 .0 02
- Sun SDK (Windows Production Release) 1.2.2 007
- Sun JRE (Windows Production Release) 1.2.2 007
- Sun JRE (Windows Production Release) 1.2.1
- Sun SDK (Windows Production Release) 1.2.1
- Sun SDK (Windows Production Release) 1.2.0
- Sun JRE (Windows Production Release) 1.2.0
- Sun JRE (Solaris Production Release) 1.3.0 .0 02
- Sun SDK (Solaris Production Release) 1.3.0 .0 02
- Sun JRE (Solaris Production Release) 1.2.2 07
- Sun SDK (Solaris Production Release) 1.2.2 07
- Sun JRE (Solaris Production Release) 1.2.0
- Sun SDK (Solaris Production Release) 1.2.0
- Sun JRE (Linux Production Release) 1.3.0 .0 03
- Sun SDK (Linux Production Release) 1.3.0 .0 02
- Sun JRE (Linux Production Release) 1.6.0 11
- Sun SDK (Linux Production Release) 1.2.2 007
- Sun JRE (Linux Production Release) 1.5.0 06
- Apple Mac OS X 10.5.3
- Sun JRE (Linux Production Release) 1.4.2 09
- Sun SDK (Solaris Production Release) 1.2.2 07A
- Sun JRE (Linux Production Release) 1.3.1 17
- Apple Mac OS X 10.4.11
- Apple Mac OS X Server 10.4.11
- Sun JDK (Linux Production Release) 1.6.0 10
- Sun JDK (Linux Production Release) 1.6.0 11
- Sun JDK (Linux Production Release) 1.5.0 17
- Sun SDK (Solaris Production Release) 1.4.2 19
- Sun SDK (Windows Production Release) 1.4.2 19
- Sun JRE (Linux Production Release) 1.4.1 03
- Sun JRE (Solaris Production Release) 1.4.1 03
- Sun JRE (Windows Production Release) 1.4.1 03
- Sun SDK (Linux Production Release) 1.3.1 24
- Sun SDK (Solaris Production Release) 1.4.1 03
- Sun SDK (Linux Production Release) 1.4.1 03
- Apple Mac OS X 10.5.1
- Apple Mac OS X Server 10.5
- Apple Mac OS X Server 10.5.1
- VMWare ESX Server 4.0
- VMWare ESX Server 3.5 ESX350-200906407-S
- VMWare vMA 4.0
- Mandriva Linux Mandrake 2009.1
- Mandriva Linux Mandrake 2009.1 X86 64
- Nortel Networks Self-Service Peri Application
- Nortel Networks Contact Center - CCT
- Nortel Networks Self-Service CCXML
- Nortel Networks Self Service VoiceXML
- VMWare VirtualCenter 2.5.Update 3 Build 11983
- Sun JRE (Windows Production Release) 1.3.1 05
- Red Hat Network Satellite (for RHEL 4 AS) 5.3
- Sun JDK (Linux Production Release) 1.5.0 07
- Apple Mac OS X Server 10.5.3
- Sun SDK (Solaris Production Release) 1.3.1 05
- Sun SDK (Solaris Production Release) 1.2.2 13
- Oracle JRockit R27.1.0
- Ubuntu Ubuntu Linux 8.10 I386
- Apple Mac OS X 10.4.4
- Apple Mac OS X Server 10.4.4
- Apple Mac OS X 10.4.5
- Apple Mac OS X Server 10.4.5
- Sun JRE (Windows Production Release) 1.4.1 07
- VMWare VirtualCenter 2.5
- HP HP-UX B.11.11
- Sun JRE (Linux Production Release) 1.4.2 08
- VMWare VirtualCenter 2.5 Update 1
- HP HP-UX B.11.23
- Sun JRE (Linux Production Release) 1.6.0 04
- Sun JDK (Linux Production Release) 1.6.0 04
- Sun JDK (Linux Production Release) 1.6.0
- VMWare VirtualCenter 2.0.2
- VMWare VirtualCenter 2.0.2 Update 1
- Sun JRE (Windows Production Release) 1.4.1 01
- VMWare VirtualCenter 2.0.2 Update 2
- Sun JRE (Solaris Production Release) 1.3.1 05
- Sun JDK (Linux Production Release) 1.5.0.0 12
- Avaya Interactive Response 3.0
- Oracle JRockit R27.6.3
- Sun JRE (Solaris Production Release) 1.3.0 01
- Mandriva Enterprise Server 5
- Mandriva Linux Mandrake 2009.0
- Mandriva Linux Mandrake 2009.0 X86 64
- Apple Mac OS X 10.4.9
- HP HP-UX 11.11.0
- Sun JDK (Linux Production Release) 1.5.0.0 03
- Sun SDK (Windows Production Release) 1.3.1 06
- Apple Mac OS X 10.5.7
- Apple Mac OS X Server 10.5.7
- Sun JDK (Linux Production Release) 1.5.0.0 04
- Sun JRE (Solaris Production Release) 1.3.1
- Sun JRE (Linux Production Release) 1.3.1 15
- Sun SDK (Windows Production Release) 1.3.1 15
- Sun SDK (Linux Production Release) 1.3.1 15
- Sun SDK (Solaris Production Release) 1.3.1 15
- Sun SDK (Solaris Production Release) 1.4.2 08
- Sun SDK (Linux Production Release) 1.4.2 08
- Sun SDK (Windows Production Release) 1.4.2 08
- Sun JRE (Linux Production Release) 1.3.1 02
- Gentoo Linux
- Sun SDK (Solaris Production Release) 1.3.1 06
- Sun JRE (Linux Production Release) 1.4.2
- Sun JRE (Solaris Production Release) 1.4.2
- Sun JRE (Windows Production Release) 1.4.2
- Apple Mac OS X 10.5.6
- Apple Mac OS X Server 10.5.6
- Sun JRE (Windows Production Release) 1.4.0 .0 01
- Sun JRE (Windows Production Release) 1.3.1 01
- Sun JRE (Windows Production Release) 1.3.1 04
- Sun JRE (Windows Production Release) 1.2.2 12
- Sun SDK (Windows Production Release) 1.4.0 .0 01
- Sun SDK (Windows Production Release) 1.3.1 04
- Sun JRE (Solaris Production Release) 1.4.0 .0 01
- Sun JRE (Solaris Production Release) 1.3.1 04
- Sun JRE (Solaris Production Release) 1.2.2 012
- Sun JRE (Linux Production Release) 1.2.2 006
- Sun JRE (Linux Production Release) 1.2.2 004
- SuSE SUSE Linux Enterprise Desktop 10 SP2
- SuSE SUSE Linux Enterprise Server 10 SP2
- Sun JRE (Windows Production Release) 1.3.1
- Sun JDK (Linux Production Release) 1.5.0.0 08
- Sun JDK (Linux Production Release) 1.5.0.0 09
- Sun JRE (Linux Production Release) 1.5.0 14
- Ubuntu Ubuntu Linux 8.10 Amd64
- Sun JRE (Linux Production Release) 1.4.1 02
- Sun JRE (Solaris Production Release) 1.4.1 02
- Sun JRE (Windows Production Release) 1.4.1 02
- Sun JRE (Linux Production Release) 1.3.1 07
- Sun JRE (Solaris Production Release) 1.3.1 07
- Sun JRE (Windows Production Release) 1.3.1 07
- Sun SDK (Linux Production Release) 1.3.1 07
- Sun SDK (Solaris Production Release) 1.3.1 07
- Sun SDK (Windows Production Release) 1.3.1 07
- Sun SDK (Linux Production Release) 1.4.1 02
- Sun SDK (Solaris Production Release) 1.4.1 02
- Sun JRE (Linux Production Release) 1.4.2 10-B03
- Sun JRE (Linux Production Release) 1.2.2 010
- Sun JRE (Linux Production Release) 1.3.0 .0 02
- Sun JRE (Linux Production Release) 1.3.0 .0 01
- Sun JRE (Windows Production Release) 1.3.0
- Sun JRE (Windows Production Release) 1.2.2 010
- Sun JRE (Windows Production Release) 1.1.8 007
- Sun JRE (Windows Production Release) 1.1.8
- Sun JRE (Windows Production Release) 1.2.2
- Sun JRE (Linux Production Release) 1.3.0 .0 04
- Sun JRE (Linux Production Release) 1.2.2 011
- Sun JRE (Linux Production Release) 1.2.2 003
- Sun JRE (Solaris Production Release) 1.3.1 20
- Sun JRE (Windows Production Release) 1.3.1 20
- Sun SDK (Windows Production Release) 1.3.1 02
- Sun JRE (Solaris Production Release) 1.1.8 13
- Sun JRE (Solaris Production Release) 1.1.8
- Sun JRE (Solaris Production Release) 1.2.2 010
- Sun JRE (Solaris Production Release) 1.2.2
- Sun SDK (Solaris Production Release) 1.3.1 02
- Sun JRE (Solaris Production Release) 1.3.1 02
- Sun JRE (Linux Production Release) 1.4.2 07
- Sun SDK (Linux Production Release) 1.3.1 02
- Apple Mac OS X Server 10.4.9
- Sun SDK (Linux Production Release) 1.2.2 010
- Sun JRE (Windows Production Release) 1.2.2 015
- Sun JRE (Windows Production Release) 1.4.0 .0 04
- Sun JRE (Solaris Production Release) 1.4.0 .0 04
- Sun SDK (Solaris Production Release) 1.2.2
- Sun JRE (Linux Production Release) 1.4.0 .0 04
- Sun SDK (Solaris Production Release) 1.3.0 02
- Sun JRE (Solaris Production Release) 1.3.1 15
- Sun JRE (Windows Production Release) 1.3.1 15
- Sun JRE (Solaris Production Release) 1.3.1 16
- Sun JRE (Solaris Production Release) 1.3.1 17
- Sun JRE (Windows Production Release) 1.3.0 .0 04
- Sun JRE (Windows Production Release) 1.3.1 17
- Sun SDK (Solaris Production Release) 1.4.0 .0 4
- Sun SDK (Windows Production Release) 1.4.0 .0 4
- Sun SDK (Windows Production Release) 1.2.2 015
- Sun JRE (Solaris Production Release) 1.3.1 19
- Sun SDK (Linux Production Release) 1.2.2 015
- Sun JRE (Windows Production Release) 1.3.0 01
- Sun JRE (Solaris Production Release) 1.3.1 01A
- Sun SDK (Solaris Production Release) 1.2.2 11
- Sun JRE (Linux Production Release) 1.3.1 04
- SuSE openSUSE 11.1
- Avaya Proactive Contact 3.0
- Red Hat Enterprise Linux Desktop 5 Client
- Red Hat Enterprise Linux Supplementary 5 Server
- Sun SDK (Solaris Production Release) 1.3.1 22
- Sun SDK (Linux Production Release) 1.4.0 .0 4
- VMWare VirtualCenter 2.0.2 Update 3
- VMWare VirtualCenter 2.0.2 Update 4
- VMWare VirtualCenter 2.5 Update 5
- VMWare VirtualCenter 2.0.2 Update 5
- Apple Mac OS X 10.5.2
- Apple Mac OS X Server 10.5.2
- Red Hat Red Hat Network Satellite (for RHEL 4) 5.1
- SuSE openSUSE 10.3
- Sun JRE (Windows Production Release) 1.1.8 009
- Sun JRE (Linux Production Release) 1.3.1 03
- Sun JRE (Solaris Production Release) 1.1.8 009
- Sun JRE (Solaris Production Release) 1.2.2 011
- Sun JRE (Solaris Production Release) 1.3.1 03
- Sun JRE (Windows Production Release) 1.2.2 011
- Sun JRE (Windows Production Release) 1.3.1 03
- Sun SDK (Linux Production Release) 1.2.2 011
- Sun SDK (Linux Production Release) 1.3.1 03
- Sun SDK (Windows Production Release) 1.2.2 011
- Sun SDK (Windows Production Release) 1.3.1 03
- Sun SDK (Solaris Production Release) 1.3.1 03
- Sun SDK (Solaris Production Release) 1.2.2 011
- HP HP-UX B.11.31
- Sun JRE (Linux Production Release) 1.2.2 015
- VMWare ESX Server 3.5 ESX350-200904401-BG
- VMWare ESXi Server 4.0
- VMWare vCenter 4.0
- Mandriva Enterprise Server 5 X86 64
- SuSE SUSE Linux Enterprise Desktop 11
- Sun SDK (Solaris Production Release) 1.3.1 20
- Nortel Networks Enterprise VoIP TM-CS1000
- Sun SDK (Solaris Production Release) 1.4.2 18
- Sun JDK (Linux Production Release) 1.6.0 02
- Sun JRE (Linux Production Release) 1.6.0 01
- Sun JRE (Linux Production Release) 1.6.0 02
- Sun JRE (Linux Production Release) 1.4.2 16
- Sun JRE (Solaris Production Release) 1.4.2 16
- Sun JRE (Windows Production Release) 1.4.2 16
- Sun JDK (Linux Production Release) 1.5.0 13
- Sun JRE (Linux Production Release) 1.5.0 12
- Sun JRE (Linux Production Release) 1.5.0 13
- Sun JDK (Linux Production Release) 1.6.0 03
- Apple Mac OS X 10.4.1
- Sun JRE (Linux Production Release) 1.6.0 03
- SuSE openSUSE 11.0
- Sun JRE (Solaris Production Release) 1.4.2 05
- Sun SDK (Solaris Production Release) 1.4.2 05
- Sun JRE (Linux Production Release) 1.2.2 007
- Sun SDK (Windows Production Release) 1.4.2 05
- Sun JRE (Windows Production Release) 1.3.1 01A
- Sun SDK (Windows Production Release) 1.3.1 01A
- Sun JDK (Linux Production Release) 1.5.0 06
- Sun JRE (Windows Production Release) 1.3.0 .0 05
- Sun JRE (Windows Production Release) 1.1.8 008
- Sun JRE (Solaris Production Release) 1.3.1 01
- Sun SDK (Solaris Production Release) 1.3.1 01
- Sun SDK (Solaris Production Release) 1.3.0 05
- Sun JRE (Solaris Production Release) 1.3.0 .0 05
- Sun JRE (Solaris Production Release) 1.1.8 14
- Sun SDK (Linux Production Release) 1.3.1 01
- Sun JRE (Linux Production Release) 1.3.1 01
- Sun JRE (Windows Production Release) 1.3.1 16
- Sun SDK (Linux Production Release) 1.3.0 05
- Apple Mac OS X 10.4.8
- Sun SDK (Windows Production Release) 1.2.2 012
- Sun JRE (Linux Production Release) 1.4.0
- Sun SDK (Linux Production Release) 1.4.0
- Sun SDK (Windows Production Release) 1.4.0
- Sun JRE (Windows Production Release) 1.4.0
- Sun SDK (Solaris Production Release) 1.4.0
- Sun JRE (Solaris Production Release) 1.4.0
- Sun JRE (Linux Production Release) 1.5.0 08
- Sun JRE (Linux Production Release) 1.5.0 09
- Sun JRE (Linux Production Release) 1.5.0 10
- Sun JDK (Linux Production Release) 1.5.0.0 11
- Sun JRE (Linux Production Release) 1.5.0 11
- Sun SDK (Solaris Production Release) 1.3.1 20
- Sun JDK (Linux Production Release) 1.6.0 01
- Sun JRE (Linux Production Release) 1.3.1 20
- Sun JRE (Linux Production Release) 1.5.0 17
- Sun JRE (Solaris Production Release) 1.4.2 19
- Sun JRE (Windows Production Release) 1.4.2 19
- Sun JRE (Linux Production Release) 1.4.2 19
- Sun SDK (Windows Production Release) 1.4.1
- Sun JRE (Windows Production Release) 1.4.1
- Sun JRE (Windows Production Release) 1.4.0 .0 02
- Sun SDK (Windows Production Release) 1.4.0 .0 02
- Sun SDK (Windows Production Release) 1.3.1 05
- Sun JRE (Windows Production Release) 1.4.2 01
- Sun JRE (Windows Production Release) 1.2.2 013
- Sun SDK (Windows Production Release) 1.2.2 013
- Sun JRE (Solaris Production Release) 1.4.1
- Sun SDK (Solaris Production Release) 1.4.1
- Sun SDK (Solaris Production Release) 1.4.0 .0 02
- Sun JRE (Solaris Production Release) 1.4.0 .0 02
- HP Serviceguard Manager A.05.00
- HP Serviceguard Manager A.05.01
- HP Serviceguard Manager A.05.02
- Sun JRE (Solaris Production Release) 1.2.2 013
- Sun JRE (Linux Production Release) 1.2.2 013
- Sun SDK (Linux Production Release) 1.2.2 13
- Sun SDK (Linux Production Release) 1.3.1 05
- Sun JRE (Linux Production Release) 1.3.1 05
- Sun JRE (Linux Production Release) 1.4.0 .0 02
- VMWare ESX Server 3.5 ESX350-200910401-SG
- Sun SDK (Linux Production Release) 1.4.1
- Sun JRE (Linux Production Release) 1.4.1
- Oracle JRockit R27.6.0
- VMWare ESX Server 3.5
- Sun SDK (Windows Production Release) 1.4.1 01
- Sun SDK (Windows Production Release) 1.4.0 .0 03
- Sun JRE (Windows Production Release) 1.4.0 .0 03
- Sun JRE (Windows Production Release) 1.3.1 06
- Sun JRE (Solaris Production Release) 1.3.0 04
- Sun SDK (Windows Production Release) 1.2.2 014
- Sun JRE (Windows Production Release) 1.2.2 014
- Sun JRE (Linux Production Release) 1.3.1 01A
- Sun SDK (Solaris Production Release) 1.4.1 01
- Sun JRE (Solaris Production Release) 1.4.1 01
- Sun JRE (Solaris Production Release) 1.4.0 .0 03
- Sun SDK (Solaris Production Release) 1.4.0 .0 03
- Sun JDK (Linux Production Release) 1.5.0 0 10
- Sun JRE (Solaris Production Release) 1.3.1 06
- Sun JRE (Solaris Production Release) 1.2.2 014
- Sun SDK (Solaris Production Release) 1.2.2 14
- Sun SDK (Linux Production Release) 1.4.1 01
- Sun JRE (Linux Production Release) 1.4.1 01
- Sun JRE (Linux Production Release) 1.4.0 .0 03
- Sun SDK (Linux Production Release) 1.4.0 .0 03
- Sun SDK (Linux Production Release) 1.3.1 06
- Sun JRE (Linux Production Release) 1.3.1 06
- Sun JRE (Linux Production Release) 1.2.2 014
- Sun SDK (Linux Production Release) 1.2.2 014
- Ubuntu Ubuntu Linux 8.10 Lpia
- Ubuntu Ubuntu Linux 8.10 Powerpc
- Ubuntu Ubuntu Linux 8.10 Sparc
- Apple Mac OS X 10.4.2
- Apple Mac OS X Server 10.4.2
- Sun JRE (Linux Production Release) 1.4.2 05
- Sun JRE (Linux Production Release) 1.4.2 02
- Sun SDK (Linux Production Release) 1.4.2 02
- Sun SDK (Linux Production Release) 1.4.2
- Sun SDK (Solaris Production Release) 1.3.1 24
- Sun JRE (Solaris Production Release) 1.4.2 12
- Sun SDK (Linux Production Release) 1.4.2 19
- Avaya Interactive Response 4.0
- Sun SDK (Windows Production Release) 1.3.1 24
- Red Hat Enterprise Linux Extras 4.8.Z
- Red Hat Enterprise Linux Supplementary EUS 5.3.Z
HTTP:MISC:AV-INVALID-CHKSUM1 - HTTP: Multiple AV Vendor Invalid Archive Checksum Bypass1
Severity: MEDIUM
Description:
This signature detects attempts against a known vulnerability in the way multiple anti-virus products scan ZIP archive files. A malicious ZIP archive containing known trojans or viruses may be downloaded and stored on the local file system without the affected product raising a warning or otherwise informing the user of a potential threat. The product in such a case exhibits ineffective and misleading behavior.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:ADOBE:SWF-ACTIONSCRIPT - HTTP: Adobe Flash Player ActionScript Function Variable Arguments Information Disclosure
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known information disclosure vulnerability in the Adobe Flash Player ActionScript Function. It is due to insufficient validation of user-supplied input. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Google Chrome 5.0.375.86
- Sun Solaris 10 Sparc
- Google Chrome 5.0.375.0
- Google Chrome 4.0.250.2
- Red Hat Enterprise Linux Desktop Supplementary 6
- Google Chrome 4.1.249.1062
- Google Chrome 5.0.375.46
- Red Hat Enterprise Linux Server Supplementary 6
- Red Hat Enterprise Linux Workstation Supplementary 6
- Google Chrome 4.1.249.1044
- Google Chrome 5.0.375.70
- Google Chrome 4.0.250.0
- Google Chrome 4.0.223.1
- Google Chrome 5.0.379.0
- Google Chrome 5.0.336.0
- Google Chrome 5.0.325.0
- Google Chrome 4.0.292.0
- Google Chrome 4.0.249.70
- Google Chrome 5.0.375.4
- Google Chrome 4.0.249.58
- Google Chrome 4.0.264.0
- Google Chrome 5.0.375.47
- Google Chrome 5.0.354.1
- Google Chrome 5.0.375.26
- Google Chrome 6.0.405.0
- Google Chrome 2.0.172.28
- Gentoo Linux
- Google Chrome 4.0.249.52
- SuSE SUSE Linux Enterprise Desktop 10 SP4
- Google Chrome 0.1.38.2
- Google Chrome 2.0.172.8
- Google Chrome 4.0.249.69
- Google Chrome 0.2.149.27
- Google Chrome 6.0.458.1
- Google Chrome 6.0.408.3
- Google Chrome 5.0.391.0
- Google Chrome 4.0.249.6
- Google Chrome 5.0.375.49
- Google Chrome 4.0.249.67
- Google Chrome 4.1.249.1006
- Google Chrome 5.0.342.1
- Google Chrome 4.1.249.1031
- Google Chrome 4.1.249.1024
- Google Chrome 5.0.307.6
- Google Chrome 10.0.648.205
- Google Chrome 0.1.42.3
- Google Chrome 1.0.154.53
- Google Chrome 1.0.154.65
- Adobe Flash Player 10.1 Release Candidate
- Google Chrome 5.0.375.69
- Google Chrome 4.0.286.0
- Google Chrome 1.0.154.53
- Google Chrome 4.0.249.62
- Adobe Flash Player 10.2.159.1
- Adobe Flash Player 10.2.154.27
- Google Chrome 5.0.342.4
- Google Chrome 4.1.249.1040
- Google Chrome 5.0.390.0
- Google Chrome 5.0.375.51
- Google Chrome 4.1.249.0
- Google Chrome 5.0.375.1
- Google Chrome 3.0.195.32
- Google Chrome 5.0.342.0
- Google Chrome 4.0.240.0
- Google Chrome 5.0.375.2
- Google Chrome 4.1.249.1039
- Google Chrome 4.1.249.1008
- Google Chrome 5.0.375.21
- Google Chrome 4.0.252.0
- Google Chrome 4.0.249.7
- Google Chrome 5.0.387.0
- Google Chrome 5.0.375.12
- Google Chrome 4.1.249.1036
- Adobe Flash Player 10.2.152.21
- Google Chrome 4.0.249.56
- Adobe Flash Player 10.0.45 2
- Google Chrome 6.0.472.55
- Google Chrome 4.1.249.1026
- Google Chrome 4.0.249.64
- Google Chrome 6.0.472.63
- Google Chrome 6.0.473.0
- Google Chrome 6.0.474.0
- Google Chrome 6.0.475.0
- Google Chrome 4.0.296.0
- Google Chrome 6.0.477.0
- Google Chrome 6.0.478.0
- Google Chrome 6.0.479.0
- Google Chrome 6.0.480.0
- Google Chrome 6.0.481.0
- Google Chrome 6.0.482.0
- Google Chrome 5.0.307.7
- Google Chrome 6.0.484.0
- Google Chrome 6.0.485.0
- Google Chrome 6.0.486.0
- Google Chrome 5.0.307.1
- Google Chrome 6.0.488.0
- Google Chrome 6.0.489.0
- Google Chrome 6.0.490.0
- Google Chrome 5.0.360.4
- Google Chrome 6.0.491.0
- Google Chrome 6.0.492.0
- Google Chrome 6.0.493.0
- Google Chrome 6.0.494.0
- Google Chrome 4.0.249.75
- Google Chrome 6.0.495.1
- Google Chrome 6.0.496.0
- Google Chrome 7.0.497.0
- Google Chrome 7.0.498.0
- Google Chrome 7.0.499.0
- Google Chrome 5.0.359.0
- Adobe Flash Player 10.1.92.10
- Google Chrome 7.0.500.1
- Google Chrome 7.0.503.0
- Google Chrome 5.0.366.1
- Google Chrome 4.1.249.1013
- Google Chrome 7.0.505.0
- Google Chrome 7.0.506.0
- Google Chrome 7.0.507.0
- Google Chrome 0.2.149.29
- Google Chrome 7.0.507.2
- Google Chrome 7.0.507.3
- Google Chrome 7.0.509.0
- Google Chrome 7.0.510.0
- Google Chrome 4.0.302.0
- Google Chrome 5.0.393.0
- Google Chrome 7.0.511.4
- Google Chrome 4.1.249.1049
- Google Chrome 7.0.513.0
- Google Chrome 5.0.356.0
- Google Chrome 7.0.514.1
- Google Chrome 7.0.515.0
- Google Chrome 7.0.516.0
- Google Chrome 7.0.517.0
- Google Chrome 7.0.517.10
- Google Chrome 7.0.517.11
- Google Chrome 7.0.517.12
- Google Chrome 7.0.517.13
- Google Chrome 7.0.517.14
- Google Chrome 7.0.517.16
- Google Chrome 7.0.517.17
- Google Chrome 7.0.517.18
- Google Chrome 7.0.517.19
- Google Chrome 7.0.517.2
- Google Chrome 7.0.517.20
- Google Chrome 7.0.517.21
- Google Chrome 7.0.517.22
- Google Chrome 7.0.517.23
- Google Chrome 2.0.172.43
- Google Chrome 5.0.328.0
- Google Chrome 4.1.249.1034
- Google Chrome 4.1.249.1020
- Google Chrome 5.0.320.0
- Google Chrome 7.0.517.29
- Google Chrome 7.0.517.30
- Google Chrome 7.0.517.31
- Google Chrome 7.0.517.32
- Google Chrome 7.0.517.33
- Google Chrome 7.0.517.34
- Google Chrome 7.0.517.35
- Google Chrome 7.0.517.36
- Google Chrome 5.0.375.125
- Google Chrome 7.0.517.38
- Google Chrome 4.0.249.33
- Google Chrome 5.0.339.0
- Google Chrome 7.0.517.40
- Google Chrome 7.0.517.5
- Google Chrome 7.0.517.6
- Google Chrome 7.0.517.7
- Google Chrome 4.0.249.72
- Google Chrome 7.0.517.9
- Google Chrome 4.0.249.66
- Google Chrome 6.0.472.49
- Google Chrome 6.0.472.5
- Google Chrome 6.0.472.50
- Google Chrome 6.0.472.51
- Google Chrome 6.0.472.52
- Google Chrome 6.0.472.53
- Google Chrome 5.0.342.7
- Google Chrome 5.0.316.0
- Google Chrome 6.0.472.56
- Google Chrome 6.0.472.57
- Google Chrome 6.0.472.6
- Google Chrome 6.0.472.7
- Google Chrome 6.0.472.8
- Google Chrome 6.0.472.9
- Google Chrome 4.0.256.0
- Google Chrome 4.0.249.38
- Google Chrome 4.0.249.12
- Google Chrome 4.0.246.0
- Google Chrome 5.0.326.0
- Google Chrome 5.0.353.0
- Google Chrome 5.0.318.0
- Google Chrome 1.0.154.46
- Google Chrome 5.0.354.0
- Google Chrome 4.0.267.0
- Google Chrome 4.0.249.50
- Google Chrome 5.0.375.99
- Google Chrome 5.0.322.2
- Google Chrome 4.0.249.14
- Google Chrome 5.0.375.30
- Google Chrome 4.0.289.0
- Google Chrome 4.0.302.1
- Google Chrome 4.1.249.1015
- Google Chrome 5.0.345.0
- Google Chrome 4.0.236.0
- Google Chrome 4.1.249.1011
- Google Chrome 6.0.472.53
- Google Chrome 4.1.249.1022
- Google Chrome 4.0.249.22
- Google Chrome 4.0.223.0
- Google Chrome 4.0.249.28
- Google Chrome 4.0.249.46
- Google Chrome 6.0.472.62
- Google Chrome 5.0.375.8
- Google Chrome 4.0.294.0
- Google Chrome 5.0.323.0
- Google Chrome 5.0.375.17
- Google Chrome 5.0.314.0
- Google Chrome 4.0.276.0
- Google Chrome 4.0.249.27
- Google Chrome 6.0.472.12
- Google Chrome 4.1.249.1048
- Google Chrome 0.1.40.1
- Google Chrome 5.0.351.0
- Adobe Flash Player 10.1.92.10
- Adobe Flash Player 10.1.95.1
- Adobe Flash Player 10.1.85.3
- Google Chrome 3.0 Beta
- Google Chrome 6.0.450.2
- Google Chrome 4.0.272.0
- Adobe Flash Player 10.1.102.64
- Google Chrome 5.0.343.0
- Google Chrome 5.0.366.0
- Google Chrome 6.0.397.0
- Sun Solaris 11 Express
- Google Chrome 0.3.154 9
- Google Chrome 4.0.249.47
- Google Chrome 5.0.360.3
- Google Chrome 5.0.342.5
- Google Chrome 5.0.344.0
- Google Chrome 5.0.338.0
- Google Chrome 4.0.249.18
- Google Chrome 3.0.182.2
- Google Chrome 5.0.350.0
- Google Chrome 5.0.375.48
- Google Chrome 2.0.172.31
- Google Chrome 2.0.172.30
- Google Chrome 4.0.249.32
- Google Chrome 5.0.369.0
- Google Chrome 5.0.375.32
- Google Chrome 4.1.249.1041
- Google Chrome 4.1.249.1058
- Google Chrome 4.0.212.1
- Google Chrome 4.0.260.0
- Google Chrome 5.0.360.5
- Google Chrome 7.0.519.0
- Google Chrome 5.0.369.2
- Google Chrome 7.0.521.0
- Google Chrome 7.0.522.0
- Google Chrome 0.2.149.30
- Google Chrome 7.0.525.0
- Google Chrome 7.0.526.0
- Google Chrome 7.0.528.0
- Google Chrome 4.1.249.1060
- Google Chrome 7.0.529.1
- Google Chrome 7.0.529.2
- Google Chrome 5.0.375.9
- Google Chrome 7.0.531.0
- Google Chrome 7.0.531.1
- Google Chrome 7.0.531.2
- Google Chrome 7.0.535.1
- Google Chrome 3.0.195.27
- Google Chrome 5.0.361.0
- Google Chrome 7.0.536.1
- Google Chrome 7.0.536.2
- Google Chrome 7.0.536.3
- Google Chrome 7.0.536.4
- Google Chrome 7.0.537.0
- Google Chrome 7.0.538.0
- Google Chrome 7.0.539.0
- Google Chrome 5.0.375.10
- Google Chrome 7.0.541.0
- Google Chrome 7.0.542.0
- Google Chrome 7.0.544.0
- Google Chrome 7.0.547.0
- Google Chrome 7.0.547.1
- Google Chrome 7.0.548.0
- Google Chrome 8.0.549.0
- Google Chrome 8.0.550.0
- Google Chrome 8.0.551.0
- Google Chrome 8.0.551.1
- Google Chrome 8.0.552.0
- Google Chrome 5.0.334.0
- Google Chrome 8.0.552.10
- Google Chrome 8.0.552.100
- Google Chrome 8.0.552.101
- Google Chrome 8.0.552.102
- Google Chrome 8.0.552.103
- Google Chrome 8.0.552.104
- Google Chrome 8.0.552.105
- Google Chrome 8.0.552.11
- Google Chrome 1.0.154.48
- Google Chrome 8.0.552.13
- Google Chrome 8.0.552.14
- Google Chrome 8.0.552.15
- Google Chrome 8.0.552.16
- Google Chrome 5.0.357.0
- Google Chrome 8.0.552.18
- Google Chrome 5.0.346.0
- Google Chrome 8.0.552.2
- Adobe Flash Player 10
- Google Chrome 5.0.372.0
- Google Chrome 8.0.552.201
- Google Chrome 8.0.552.202
- Google Chrome 8.0.552.203
- Google Chrome 8.0.552.204
- Google Chrome 8.0.552.205
- Google Chrome 8.0.552.206
- Google Chrome 8.0.552.207
- Google Chrome 8.0.552.208
- Google Chrome 8.0.552.209
- Google Chrome 8.0.552.21
- Google Chrome 8.0.552.210
- Google Chrome 8.0.552.211
- Google Chrome 8.0.552.212
- Google Chrome 8.0.552.213
- Google Chrome 8.0.552.214
- Google Chrome 3.0.190.2
- Google Chrome 4.0.249.31
- Google Chrome 3.0.195.25
- Google Chrome 5.0.375.34
- Google Chrome 4.0.229.1
- Google Chrome 4.0.288.1
- Google Chrome 4.1.249.1063
- Google Chrome 4.0.249.35
- Google Chrome 4.0.249.1
- Google Chrome 0.3.154.0
- Google Chrome 2.0.169.1
- Google Chrome 4.1.249.1061
- Google Chrome 5.0.375.55
- Google Chrome 5.0.365.0
- Google Chrome 4.0.249.73
- Google Chrome 4.0.303.0
- Google Chrome 4.0.249.76
- Google Chrome 5.0.307.9
- Google Chrome 5.0.380.0
- Google Chrome 3.0.195.36
- Google Chrome 5.0.382.0
- Google Chrome 2.0.172.33
- Adobe Flash Player 10.1.102.65
- Google Chrome 5.0.307.3
- Google Chrome 4.0.249.2
- Adobe Flash Player 10.0.12.10
- Google Chrome 5.0.369.1
- Google Chrome 4.0.255.0
- Google Chrome 5.0.375.127
- Google Chrome 4.0.305.0
- Google Chrome 4.0.249.26
- Google Chrome 2.0.170.0
- Google Chrome 4.0.249.74
- Google Chrome 8.0.552.224
- Google Chrome 11.0.672.2
- Google Chrome 11
- Google Chrome 4.0.287.0
- Google Chrome 11.0.696.43
- Google Chrome 4.0.223.8
- Google Chrome 4.0.249.42
- Google Chrome 4.0.239.0
- Google Chrome 4.0.257.0
- Google Chrome 4.0.249.49
- Google Chrome 4.0.222.5
- Google Chrome 4.1.249.1016
- Google Chrome 4.0.249.16
- Google Chrome 5.0.317.2
- Google Chrome 4.0.249.81
- Google Chrome 1.0.154.55
- Google Chrome 1.0.154.59
- Google Chrome 4.0.249.36
- Google Chrome 5.0.324.0
- Google Chrome 4.0.249.60
- Google Chrome 4.0.237.0
- Google Chrome 5.0.375.25
- Google Chrome 4.1.249.1042
- Google Chrome 4.1.249.1045
- Google Chrome 4.0.222.0
- Google Chrome 5.0.307.11
- Google Chrome 5.0.342.9
- Google Chrome 4.0.249.78
- Google Chrome 4.0.223.4
- Google Chrome 5.0.335.3
- Google Chrome 4.0.248.0
- Google Chrome 4.0.262.0
- Google Chrome 4.0.263.0
- Google Chrome 5.0.395.0
- Google Chrome 5.0.381.0
- Google Chrome 5.0.394.0
- Google Chrome 4.0.249.9
- Google Chrome 11.0.696.43
- Google Chrome 4.1.249.1038
- Google Chrome 5.0.333.0
- Google Chrome 9.0.597.107
- Google Chrome 4.0.242.0
- Google Chrome 6.0.465.2
- Google Chrome 6.0.466.0
- Google Chrome 6.0.466.1
- Google Chrome 6.0.466.2
- Google Chrome 6.0.466.3
- Google Chrome 6.0.466.4
- Google Chrome 6.0.466.5
- Google Chrome 6.0.466.6
- Google Chrome 6.0.467.0
- Google Chrome 6.0.469.0
- Google Chrome 6.0.470.0
- Google Chrome 6.0.471.0
- Google Chrome 6.0.472.0
- Google Chrome 6.0.472.1
- Google Chrome 5.0.362.0
- Google Chrome 6.0.472.11
- Google Chrome 5.0.375.20
- Google Chrome 6.0.472.13
- Google Chrome 6.0.472.14
- Google Chrome 6.0.472.15
- Google Chrome 6.0.472.16
- Google Chrome 6.0.472.17
- Google Chrome 6.0.472.18
- Google Chrome 6.0.472.19
- Google Chrome 6.0.472.2
- Google Chrome 6.0.472.20
- Google Chrome 6.0.472.21
- Google Chrome 11.0.696.65
- Google Chrome 6.0.472.23
- Google Chrome 6.0.472.24
- Google Chrome 6.0.472.25
- Google Chrome 5.0.321.0
- Google Chrome 4.0.249.44
- Google Chrome 6.0.472.28
- Google Chrome 6.0.472.29
- Google Chrome 6.0.472.3
- Google Chrome 6.0.472.30
- Google Chrome 6.0.472.31
- Google Chrome 4.0.249.25
- Google Chrome 6.0.472.33
- Google Chrome 6.0.472.34
- Google Chrome 4.0.249.77
- Google Chrome 4.0.302.2
- Google Chrome 6.0.472.37
- Google Chrome 6.0.472.38
- Google Chrome 5.0.322.1
- Google Chrome 5.0.348.0
- Google Chrome 6.0.472.40
- Google Chrome 4.1.249.1017
- Google Chrome 6.0.472.42
- Google Chrome 4.0.249.37
- Google Chrome 5.0.335.4
- Google Chrome 6.0.472.45
- Google Chrome 6.0.472.46
- Google Chrome 6.0.472.47
- Google Chrome 6.0.472.48
- Adobe Flash Player 10.0.22.87
- Google Chrome 5.0.358.0
- Google Chrome 5.0.375.33
- Google Chrome 4.1.249.1032
- Google Chrome 4.0.243.0
- Google Chrome 4.0.249.3
- Adobe Flash Player 10.2.154.28
- Adobe Flash Player 10.3.181.14
- Adobe Flash Player 10.3.185.21
- Google Chrome 0.4.154.33
- Google Chrome 4.0.249.57
- Google Chrome 8.0.552.216
- Google Chrome 8.0.552.217
- Google Chrome 8.0.552.218
- Google Chrome 8.0.552.219
- Google Chrome 8.0.552.220
- Google Chrome 8.0.552.221
- Google Chrome 8.0.552.222
- Google Chrome 8.0.552.223
- Google Chrome 11.0.696.68
- Google Chrome 8.0.552.226
- Google Chrome 8.0.552.300
- Google Chrome 8.0.552.301
- Google Chrome 8.0.552.302
- Google Chrome 4.0.245.0
- Google Chrome 8.0.552.304
- Google Chrome 8.0.552.305
- Google Chrome 8.0.552.306
- Google Chrome 8.0.552.307
- Google Chrome 8.0.552.308
- Google Chrome 8.0.552.309
- Google Chrome 8.0.552.310
- Google Chrome 3.0.195.37
- Google Chrome 5.0.375.73
- Google Chrome 8.0.552.303
- Google Chrome 4.0.223.7
- Adobe Flash Player 10.0.45.2
- Google Chrome 5.0.378.0
- Google Chrome 5.0.332.0
- Google Chrome 5.0.307.8
- Google Chrome 4.0.249.19
- Google Chrome 5.0.375.36
- Google Chrome 4.1.249.1030
- Google Chrome 6.0.437.0
- Google Chrome 5.0.375.16
- Adobe Flash Player 10.1.95.2
- Google Chrome 4.0.221.8
- Google Chrome 4.1.249.1025
- Google Chrome 11.0.696.57
- Google Chrome 5.0.342.8
- Google Chrome 5.0.375.31
- Google Chrome 4.0.268.0
- Google Chrome 4.1.249.1021
- Google Chrome 11.0.696.77
- Google Chrome 2.0.169.0
- Google Chrome 6.0.472.32
- Google Chrome 5.0.366.4
- Google Chrome 5.0.370.0
- Google Chrome 4.1.249.1055
- Google Chrome 4.0.249.61
- Google Chrome 6.0.401.1
- Google Chrome 5.0.375.52
- Google Chrome 5.0.375.27
- Adobe Flash Player 10.1.51.66
- Google Chrome 4.0.249.43
- Google Chrome 7.0.499.1
- Google Chrome 5.0.375.29
- Google Chrome 5.0.375.38
- Google Chrome 4.0.299.0
- Google Chrome 4.1.249.1014
- Google Chrome 10.0.648.205
- Google Chrome 8.0.552.237
- Google Chrome 4.0.212.0
- Google Chrome 5.0.308.0
- Google Chrome 4.0.261.0
- Google Chrome 5.0.322.0
- Google Chrome 7.0.500.0
- Google Chrome 5.0.347.0
- Google Chrome 5.0.375.97
- Google Chrome 5.0.384.0
- Google Chrome 4.0.249.89
- Google Chrome 4.0.269.0
- Google Chrome 4.0.271.0
- Google Chrome 10.0.648.127
- Google Chrome 10
- Google Chrome 4.0.249.80
- Google Chrome 5.0.342.6
- Google Chrome 5.0.366.3
- Google Chrome 8.0.552.344
- Google Chrome 4.0.258.0
- Google Chrome 4.1.249.1001
- Google Chrome 4.0.249.24
- Google Chrome 4.0.222.12
- Google Chrome 4.0.249.0
- Google Chrome 4.0.249.40
- Google Chrome 5.0.375.19
- Google Chrome 4.1.249.1028
- Google Chrome 1.0.154.64
- Adobe Flash Player 10.0.45 2
- Google Chrome 5.0.385.0
- Google Chrome 1.0.154.61
- Google Chrome 2.0.172.27
- Google Chrome 5.0.375.14
- Google Chrome 5.0.307.5
- Google Chrome 5.0.375.6
- Google Chrome 4.0.223.2
- Google Chrome 5.0.340.0
- Google Chrome 11.0.696.71
- Google Chrome 10.0.648.127
- Google Chrome 10.0.648.133
- Google Chrome 10.0.648.128
- Google Chrome 5.0.375.35
- Google Chrome 4.0.249.59
- Google Chrome 7.0.503.1
- Google Chrome 5.0.335.1
- Adobe Flash Player 10.2.152.33
- Adobe Flash Player 10.2.154.13
- Google Chrome 4.0.249.34
- Google Chrome 5.0.375.53
- Google Chrome 5.0.315.0
- Google Chrome 5.0.367.0
- Google Chrome 4.0.249.53
- Google Chrome 4.1.249.1009
- Google Chrome 1.0.154.52
- Google Chrome 2.0.172.38
- SuSE openSUSE 11.4
- Google Chrome 4.0.265.0
- Google Chrome 4.0.277.0
- Google Chrome 6.0.472.55
- Google Chrome 5.0.342.2
- Google Chrome 4.1.249.1007
- Google Chrome 2.0.159.0
- Google Chrome 4.0.266.0
- Google Chrome 3.0.195.38
- Google Chrome 8.0.552.1
- Adobe Flash Player 10.1.53.64
- Google Chrome 4.0.249.68
- Google Chrome 3.0.193.2 Beta
- Google Chrome 4.1.249.1004
- Google Chrome 3.0.195.2
- Google Chrome 4.1.249.1037
- Google Chrome 4.0.249.78 Beta
- Google Chrome 4.0.223.5
- Google Chrome 5.0.375.125
- Adobe Flash Player 10.0.42.34
- Google Chrome 4.0.249.29
- Google Chrome 3.0.195.24
- Google Chrome 5.0.375.39
- Google Chrome 4.1 Beta
- Google Chrome 6.0.399.0
- Google Chrome 6.0.400.0
- Google Chrome 6.0.401.0
- Google Chrome 5.0.375.13
- Google Chrome 6.0.403.0
- Adobe Flash Player 10.0.12 .36
- Google Chrome 6.0.404.1
- Google Chrome 6.0.404.2
- Google Chrome 7.0.517.41
- Google Chrome 6.0.406.0
- Google Chrome 6.0.407.0
- Google Chrome 6.0.408.0
- Google Chrome 6.0.408.1
- Google Chrome 6.0.408.10
- Google Chrome 6.0.408.2
- Google Chrome 5.0.375.37
- Google Chrome 6.0.408.4
- Google Chrome 6.0.408.5
- Google Chrome 6.0.408.6
- Google Chrome 6.0.408.7
- Google Chrome 6.0.408.8
- Google Chrome 6.0.408.9
- Google Chrome 6.0.409.0
- Google Chrome 7.0.518.0
- Google Chrome 6.0.411.0
- Google Chrome 6.0.412.0
- Google Chrome 6.0.413.0
- Google Chrome 6.0.414.0
- Google Chrome 6.0.415.0
- Google Chrome 6.0.415.1
- Google Chrome 6.0.416.0
- Google Chrome 6.0.416.1
- Google Chrome 6.0.417.0
- Google Chrome 6.0.418.0
- Google Chrome 6.0.418.1
- Google Chrome 7.0.520.0
- Google Chrome 6.0.418.3
- Google Chrome 6.0.418.4
- Google Chrome 6.0.418.5
- Google Chrome 6.0.418.6
- Google Chrome 6.0.418.7
- Google Chrome 6.0.418.8
- Google Chrome 6.0.418.9
- Google Chrome 6.0.419.0
- Google Chrome 6.0.421.0
- Google Chrome 6.0.422.0
- Google Chrome 6.0.423.0
- Google Chrome 6.0.424.0
- Google Chrome 6.0.425.0
- Google Chrome 6.0.426.0
- Google Chrome 6.0.427.0
- Google Chrome 6.0.428.0
- Google Chrome 6.0.430.0
- Google Chrome 6.0.431.0
- Google Chrome 6.0.432.0
- Google Chrome 6.0.433.0
- Google Chrome 6.0.434.0
- Google Chrome 6.0.435.0
- Google Chrome 6.0.436.0
- Google Chrome 6.0.465.1
- Google Chrome 6.0.437.1
- Google Chrome 6.0.437.2
- Google Chrome 6.0.437.3
- Google Chrome 6.0.438.0
- Google Chrome 6.0.440.0
- Google Chrome 6.0.441.0
- Google Chrome 6.0.443.0
- Google Chrome 6.0.444.0
- Google Chrome 6.0.445.0
- Google Chrome 6.0.445.1
- Google Chrome 6.0.446.0
- Google Chrome 6.0.447.0
- Google Chrome 6.0.447.1
- Google Chrome 6.0.447.2
- Google Chrome 6.0.449.0
- Google Chrome 6.0.450.0
- Google Chrome 6.0.450.1
- Google Chrome 7.0.529.0
- Google Chrome 6.0.450.3
- Google Chrome 6.0.450.4
- Google Chrome 4.0.290.0
- Google Chrome 5.0.375.23
- Google Chrome 6.0.472.10
- Google Chrome 4.1.249.1036
- Google Chrome 2.0.172.37
- Google Chrome 7.0.530.0
- Adobe Flash Player 10.0.15 .3
- Google Chrome 5.0.313.0
- Google Chrome 4.1.249.1050
- Google Chrome 4.0.288.0
- Adobe Flash Player 10.2.154.18
- Google Chrome 6.0.483.0
- Google Chrome 4.1.249.1010
- Google Chrome 0.1.38.1
- Google Chrome 7.0.535.2
- Google Chrome 6.0.404.0
- Xerox FreeFlow Print Server (FFPS) 73.C0.41
- Xerox FreeFlow Print Server (FFPS) 73.B3.61
- Google Chrome 7.0.536.0
- Google Chrome 4.0.224.0
- Google Chrome 5.0.374.0
- Google Chrome 4.0.249.48
- Google Chrome 5.0.349.0
- Google Chrome 6.0.487.0
- Google Chrome 5.0.386.0
- Google Chrome 4.0.249.63
- Google Chrome 0.1.42.2
- Google Chrome 5.0.383.0
- Google Chrome 4.1.249.1059
- Google Chrome 5.0.375.15
- Google Chrome 4.0.295.0
- Google Chrome 4.1.249.1054
- Adobe Flash Player 10.2.153.1
- Adobe Flash Player 10.2.154.24
- Adobe Flash Player 10.2.156.12
- Adobe Flash Player 10.2.154.25
- Google Chrome 9.0.597.84
- Google Chrome 4.0.275.1
- Google Chrome 6.0.490.1
- Google Chrome 6.0.472.22
- Google Chrome 4.0.249.39
- Google Chrome 10.0.648.205
- Google Chrome 4.0.300.0
- Google Chrome 4.1.249.1035
- Adobe Flash Player 10.1.82.76
- Google Chrome 7.0.540.0
- Red Hat Enterprise Linux Supplementary 5 Server
- Google Chrome 5.0.375.126
- Google Chrome 6.0.472.26
- Google Chrome 6.0.495.0
- Google Chrome 6.0.472.27
- Google Chrome 4.0.301.0
- Google Chrome 4.1.249.1029
- Google Chrome 0.2.152.1
- Google Chrome 0.2.153.1
- Google Chrome 10.0.648.204
- Google Chrome 0.3.154.3
- Google Chrome 0.4.154.18
- Google Chrome 0.4.154.22
- Google Chrome 0.4.154.31
- Google Chrome 4.1.249.1033
- Google Chrome 1.0.154.39
- Google Chrome 1.0.154.42
- Google Chrome 1.0.154.43
- Google Chrome 4.1.249.1051
- Google Chrome 2.0.156.1
- Google Chrome 2.0.157.0
- Google Chrome 2.0.157.2
- Google Chrome 2.0.158.0
- Google Chrome 4.1.249.1064
- Google Chrome 6.0.452.0
- Google Chrome 6.0.452.1
- Google Chrome 6.0.453.0
- Google Chrome 6.0.453.1
- Google Chrome 6.0.454.0
- Google Chrome 6.0.455.0
- Google Chrome 4.0.249.5
- Google Chrome 5.0.375.41
- Google Chrome 5.0.375.42
- Adobe Flash Player 10.1.106.16
- Google Chrome 6.0.458.2
- Google Chrome 6.0.459.0
- Google Chrome 6.0.460.0
- Google Chrome 6.0.461.0
- Google Chrome 6.0.462.0
- Google Chrome 6.0.464.1
- Google Chrome 5.0.375.50
- Google Chrome 6.0.472.58
- Google Chrome 6.0.472.60
- Google Chrome 6.0.472.61
- Google Chrome 5.0.375.54
- Google Chrome 5.0.375.56
- Google Chrome 5.0.375.57
- Google Chrome 5.0.375.58
- Google Chrome 5.0.375.59
- Google Chrome 5.0.375.60
- Google Chrome 5.0.375.61
- Google Chrome 5.0.375.62
- Google Chrome 5.0.375.63
- Google Chrome 5.0.375.64
- Google Chrome 5.0.375.65
- Google Chrome 5.0.375.66
- Google Chrome 5.0.375.67
- Google Chrome 6.0.472.59
- Google Chrome 4.0.249.82
- Google Chrome 6.0.472.36
- Google Chrome 9.0.597.94
- Google Chrome 7.0.504.0
- Google Chrome 5.0.375.40
- Google Chrome 5.0.330.0
- Google Chrome 5.0.317.0
- Google Chrome 4.0.278.0
- Google Chrome 5.0.375.22
- Google Chrome 5.0.366.2
- Google Chrome 6.0.472.39
- Google Chrome 6.0.472.4
- Google Chrome 7.0.507.1
- Google Chrome 4.0.249.8
- Google Chrome 3.0.195.21
- Google Chrome 6.0.472.41
- Google Chrome 7.0.517.43
- Google Chrome 8.0.552.215
- Google Chrome 5.0.375.28
- Google Chrome 6.0.472.43
- Google Chrome 5.0.363.0
- Google Chrome 5.0.341.0
- Google Chrome 5.0.371.0
- Google Chrome 6.0.472.44
- Google Chrome 7.0.511.1
- Google Chrome 4.0.244.0
- Adobe Flash Player 10.0.0.584
- Google Chrome 7.0.511.2
- Google Chrome 4.0.249.65
- Google Chrome 5.0.373.0
- Google Chrome 4.0.249.55
- Google Chrome 4.0.259.0
- Google Chrome 4.0.249.11
- Google Chrome 7.0.512.0
- Google Chrome 4.0.235.0
- Google Chrome 4.0.249.71
- Google Chrome 8.0.552.17
- Google Chrome 5.0.307.10
- Google Chrome 5.0.376.0
- Google Chrome 7.0.514.0
- Google Chrome 2.0.172
- Google Chrome 4.0.222.1
- Google Chrome 4.1.249.1018
- Google Chrome 5.0.392.0
- Google Chrome 4.0.302.3
- Google Chrome 4.0.249.79
- Google Chrome 8.0.552.200
- Google Chrome 4.0.241.0
- Google Chrome 5.0.375.3
- Google Chrome 4.1.249.1046
- Google Chrome 4.0.249.4
- Google Chrome 4.1.249.1043
- Google Chrome 4.0.251.0
- Google Chrome 6.0.451.0
- Google Chrome 7.0.517.41
- Google Chrome 7.0.517.42
- Google Chrome 5.0.356.2
- Google Chrome 5.0.350.1
- Google Chrome 5.0.314.1
- Google Chrome 5.0.307.4
- Google Chrome 5.0.319.0
- Google Chrome 5.0.342.3
- Google Chrome 5.0.317.1
- Google Chrome 5.0.335.2
- Google Chrome 5.0.356.1
- Google Chrome 3.0.195.33
- Sun Solaris 10 X86
- Google Chrome 4.0.249.45
- Google Chrome 5.0.309.0
- Google Chrome 5.0.375.11
- Google Chrome 7.0.524.0
- Google Chrome 8.0.552.19
- Google Chrome 4.1.249.1053
- Google Chrome 4.1.249.1056
- Google Chrome 4.0.249.21
- Google Chrome 7.0.517.24
- Google Chrome 2.0.172.2
- Google Chrome 0.1.38.4
- Google Chrome 7.0.517.25
- Google Chrome 4.0.249.17
- Google Chrome 7.0.517.26
- Google Chrome 6.0.418.2
- Google Chrome 5.0.375.5
- Google Chrome 7.0.517.27
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Google Chrome 7.0.517.28
- Google Chrome 5.0.306.1
- Google Chrome 4.1.249.1057
- Google Chrome 4.0.254.0
- Adobe Flash Player 10.3.181.16
- Adobe Flash Player 10.3.185.22
- Adobe Flash Player 10.3.181.22
- Adobe Flash Player 10.3.181.23
- Google Chrome 5.0.327.0
- Adobe Flash Player 10.0.32.18
- Google Chrome 8.0.552.20
- Adobe Flash Player 10.0.32 18
- Google Chrome 5.0.375.68
- Google Chrome 1.0.154.36
- Google Chrome 5.0.375.71
- Google Chrome 5.0.375.72
- Adobe Flash Player 10.0.12 .35
- Google Chrome 5.0.375.74
- Google Chrome 5.0.375.75
- Google Chrome 5.0.375.76
- Google Chrome 5.0.375.77
- Google Chrome 5.0.375.78
- Google Chrome 5.0.375.79
- Google Chrome 5.0.375.80
- Google Chrome 5.0.375.81
- Google Chrome 5.0.375.82
- Google Chrome 5.0.375.83
- Google Chrome 5.0.375.84
- Google Chrome 5.0.375.85
- Google Chrome 5.0.375.86
- Google Chrome 5.0.375.87
- Google Chrome 5.0.375.88
- Google Chrome 5.0.375.89
- Google Chrome 5.0.375.90
- Google Chrome 5.0.375.91
- Google Chrome 5.0.375.92
- Google Chrome 5.0.375.93
- Google Chrome 5.0.375.94
- Google Chrome 5.0.375.95
- Google Chrome 5.0.375.96
- Google Chrome 7.0.517.37
- Google Chrome 5.0.375.98
- Google Chrome 5.0.375.99
- Google Chrome 5.0.355.0
- Google Chrome 5.0.335.0
- Google Chrome 5.0.364.0
- Google Chrome 7.0.517.39
- Google Chrome 4.0.304.0
- Google Chrome 4.1.249.1019
- Google Chrome 7.0.517.4
- Google Chrome 4.0.249.41
- Google Chrome 12.0.742.91
- Google Chrome 4.1.249.1052
- Adobe Flash Player 10.3.185.23
- Google Chrome 6.0.476.0
- Google Chrome 4.0.249.23
- Google Chrome 4.0.247.0
- Google Chrome 7.0.517.44
- Google Chrome 4.0.237.1
- Google Chrome 7.0.517.8
- Google Chrome 4.1.249.1047
- Google Chrome 4.0.275.0
- Google Chrome 6.0.456.0
- Google Chrome 8.0.552.215
- Google Chrome 4.0.249.51
- Google Chrome 5.0.375.18
- Google Chrome 5.0.368.0
- Google Chrome 4.1.249.1023
- Google Chrome 8.0.552.12
- Google Chrome 5.0.360.0
- Google Chrome 5.0.382.3
- Google Chrome 6.0.398.0
- Google Chrome 5.0.375.44
- Google Chrome 4.0.249.30
- Google Chrome 4.0.249.20
- Google Chrome 5.0.375.43
- Google Chrome 6.0.457.0
- Google Chrome 4.0.249.54
- Google Chrome 4.0.249.10
- Google Chrome 5.0.375.7
- Google Chrome 5.0.329.0
- Google Chrome 5.0.337.0
- Google Chrome 4.1.249.1027
- SuSE openSUSE 11.3
- Google Chrome 5.0.396.0
- SuSE SUSE Linux Enterprise Desktop 11 SP1
- Google Chrome 8.0.552.225
- Google Chrome 5.0.306.0
- Adobe Flash Player 10.2.157.51
- Google Chrome 6.0.458.0
- Research In Motion Blackberry PlayBook Tablet Software 1.0.5.2342
- Google Chrome 6.0.472.35
- Google Chrome 6.0.410.0
- Adobe Flash Player 10.1.105.6
- Google Chrome 4.1.249.1012
- Google Chrome 5.0.375.45
- Google Chrome 12
- Google Chrome 6.0.472.54
APP:ORACLE:RHINOSCRIPT-BYPASS - APP: Oracle Java Applet Rhino Script Engine Policy Bypass
Severity: HIGH
Description:
This signature detects attempts to exploit a policy bypass vulnerability in the Oracle Java Rhino Script engine. This issue can be used with a Java Applet to execute Java code outside of the sandbox. The vulnerability is caused by insufficient restrictions of certain instances of the error object. An attacker can exploit this vulnerability by enticing a user with sufficient privileges to open a webpage containing a Java Applet and Javascript code running the Rhino script engine. Successful exploitation can result in the execution of arbitrary Java code with full privileges of the currently logged in user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- Ubuntu Ubuntu Linux 11.04 amd64
- Ubuntu Ubuntu Linux 11.04 ARM
- Ubuntu Ubuntu Linux 11.04 i386
- Ubuntu Ubuntu Linux 11.04 powerpc
- Red Hat Enterprise Linux Desktop 6
- Red Hat Enterprise Linux Desktop Optional 6
- Red Hat Enterprise Linux HPC Node 6
- Red Hat Enterprise Linux HPC Node Optional 6
- Red Hat Enterprise Linux Server 6
- Red Hat Enterprise Linux Server Optional 6
- Red Hat Enterprise Linux Workstation 6
- Red Hat Enterprise Linux Workstation Optional 6
- Red Hat Enterprise Linux Desktop Supplementary 6
- Apple Mac Os X 10.6.5
- Red Hat Enterprise Linux HPC Node Supplementary 6
- Apple Mac OS X Server 10.6.5
- Red Hat Enterprise Linux Server Supplementary 6
- Red Hat Enterprise Linux Workstation Supplementary 6
- Sun JRE (Linux Production Release) 1.6.0_25
- Sun JRE (Windows Production Release) 1.6.0_21
- Avaya Message Networking 5.2.2
- Avaya Messaging Storage Server 5.2.2
- Avaya Proactive Contact 4.2.1
- Avaya Proactive Contact 4.0.1
- Avaya Messaging Storage Server 5.2
- SuSE SUSE Linux Enterprise Server 10 SP4
- Avaya Aura Presence Services 6.0
- Avaya Aura Conferencing 6.0 Standard
- Avaya IP Office Application Server 6.0
- Avaya Messaging Storage Server 5.2 SP1
- Sun JDK (Linux Production Release) 1.6.0_24
- Sun JDK (Solaris Production Release) 1.6.0_24
- Sun JDK (Windows Production Release) 1.6.0_24
- Sun JRE (Linux Production Release) 1.6.0_24
- Sun JRE (Solaris Production Release) 1.6.0_24
- Sun JRE (Windows Production Release) 1.6.0_24
- Apple Mac Os X 10.6.8
- Apple Mac Os X Server 10.6.8
- Apple Mac OS X 10.6.2
- Apple Mac OS X Server 10.6.2
- Avaya Proactive Contact 4.1
- Apple Mac OS X 10.6.5
- Apple Mac OS X Server 10.6.5
- IBM Java SE 6.0.0 SR9
- Avaya Aura Session Manager 6.1 Sp1
- Avaya Aura Session Manager 6.1 SP2
- Avaya Aura System Manager 6.1 Sp1
- Avaya Aura SIP Enablement Services 5.1
- Sun JRE (Linux Production Release) 1.6.0 07
- Sun JDK (Linux Production Release) 1.6.0 07
- Avaya Meeting Exchange 5.2 SP2
- Sun JDK (Windows Production Release) 1.6.0 20
- Avaya Proactive Contact 4.1.1
- Sun JDK (Linux Production Release) 1.6.0 05
- Sun JRE (Linux Production Release) 1.6.0 05
- Sun JDK (Linux Production Release) 1.6.0 06
- Sun JRE (Linux Production Release) 1.6.0 06
- IBM Java SE 6.0 SR5
- Debian Linux 6.0 ia-32
- Debian Linux 6.0 amd64
- Debian Linux 6.0 arm
- Debian Linux 6.0 powerpc
- Debian Linux 6.0 sparc
- Debian Linux 6.0 ia-64
- Debian Linux 6.0 mips
- Sun JDK (Linux Production Release) 1.6.0_23
- Sun JDK (Solaris Production Release) 1.6.0_23
- Sun JDK (Windows Production Release) 1.6.0_23
- Sun JRE (Linux Production Release) 1.6.0_23
- Sun JRE (Solaris Production Release) 1.6.0_23
- Sun JRE (Windows Production Release) 1.6.0_23
- Avaya Interactive Response 4.0
- Avaya CMS Server 15.0
- OpenJDK 1.6.0
- Avaya IR 4.0
- Sun JDK (Solaris Production Release) 1.6.0 20
- Sun JDK (Linux Production Release) 1.6.0 20
- Sun JRE (Linux Production Release) 1.6.0 14
- Sun JRE (Windows Production Release) 1.6.0 14
- Sun JRE (Solaris Production Release) 1.6.0 14
- IBM Java SE 7.0
- Mandriva Linux Mandrake 2011
- Mandriva Linux Mandrake 2011 x86_64
- Apple Mac Os X 10.7
- Red Hat Fedora 15
- IBM Java SE 6 SR8 FP1
- Avaya Aura Application Enablement Services 6.1
- Avaya Aura Session Manager 6.1
- Avaya Aura SIP Enablement Services 5.0
- Sun JDK (Linux Production Release) 1.7.0
- SuSE SUSE Linux Enterprise Server 11 SP1 for SP2
- Red Hat Enterprise Linux WS Extras 4
- Red Hat Enterprise Linux ES Extras 4
- Red Hat Enterprise Linux AS Extras 4
- Red Hat Desktop Extras 4
- Avaya Proactive Contact 4.2
- Avaya Aura Experience Portal 6.0
- Avaya Aura Presence Services 6.1
- Avaya Aura Communication Manager Utility Services 6.0
- Sun JDK (Linux Production Release) 1.6.0 Update 10
- Sun JDK (Linux Production Release) 1.6.0 Update 11
- Sun JDK (Linux Production Release) 1.6.0 Update 12
- Sun JDK (Linux Production Release) 1.6.0 Update 13
- Sun JDK (Linux Production Release) 1.6.0 Update 14
- Sun JDK (Linux Production Release) 1.6.0 Update 15
- Sun JDK (Linux Production Release) 1.6.0 Update 16
- Sun JDK (Linux Production Release) 1.6.0 Update 17
- Sun JDK (Linux Production Release) 1.6.0 Update 18
- Sun JDK (Linux Production Release) 1.6.0 Update 19
- Sun JDK (Linux Production Release) 1.6.0 Update 20
- Sun JDK (Linux Production Release) 1.6.0 Update 21
- Sun JDK (Linux Production Release) 1.6.0 Update 3
- Sun JDK (Linux Production Release) 1.6.0 Update 4
- Sun JDK (Linux Production Release) 1.6.0 Update 5
- Sun JDK (Linux Production Release) 1.6.0 Update 6
- Sun JDK (Linux Production Release) 1.6.0 Update 7
- Avaya Messaging Storage Server 5.2.8
- Apple Mac OS X 10.6
- Apple Mac OS X Server 10.6
- Oracle Enterprise Linux 5
- Oracle Enterprise Linux 6
- Sun JDK (Solaris Production Release) 1.6.0 05
- Panda Antivirus 1.6.0 Update 1
- Panda Antivirus 1.6.0 Update 10
- Panda Antivirus 1.6.0 Update 11
- Panda Antivirus 1.6.0 Update 12
- Panda Antivirus 1.6.0 Update 13
- Panda Antivirus 1.6.0 Update 14
- Panda Antivirus 1.6.0 Update 15
- Panda Antivirus 1.6.0 Update 16
- Panda Antivirus 1.6.0 Update 17
- Panda Antivirus 1.6.0 Update 18
- Panda Antivirus 1.6.0 Update 19
- Panda Antivirus 1.6.0 Update 2
- Panda Antivirus 1.6.0 Update 20
- Panda Antivirus 1.6.0 Update 21
- Panda Antivirus 1.6.0 Update 3
- Panda Antivirus 1.6.0 Update 4
- Panda Antivirus 1.6.0 Update 5
- Panda Antivirus 1.6.0 Update 6
- Panda Antivirus 1.6.0 Update 7
- Avaya Voice Portal 5.0
- Avaya Meeting Exchange 5.0 SP1
- Avaya Meeting Exchange 5.0 SP2
- Avaya Meeting Exchange 5.1 SP1
- Apple Mac OS X 10.6.3
- Apple Mac OS X Server 10.6.3
- SuSE SUSE Linux Enterprise Software Development Kit 11 SP1 for SP2
- Avaya Aura SIP Enablement Services 5.2
- Avaya Voice Portal 5.0 SP1
- Sun JRE (Linux Production Release) 1.6.0 19
- Sun JRE (Windows Production Release) 1.6.0 19
- Sun JRE (Solaris Production Release) 1.6.0 19
- Sun JDK (Solaris Production Release) 1.6.0 19
- Sun JDK (Windows Production Release) 1.6.0 19
- Sun JDK (Linux Production Release) 1.6.0 19
- Apple Mac Os X 10.6.6
- Apple Mac OS X Server 10.6.6
- Avaya Aura System Manager 6.1
- Sun JRE (Linux Production Release) 1.6.0 12
- Red Hat Fedora 14
- Avaya Aura System Platform 1.1
- Sun JRE (Linux Production Release) 1.6.0
- Sun JRE (Linux Production Release) 1.6.0 10
- Avaya Message Networking 5.2.4
- Apple Mac OS X Server 10.6.1
- Apple Mac OS X 10.6.1
- Sun JDK (Solaris Production Release) 1.6.0 01
- Avaya Proactive Contact 5.0
- Avaya Messaging Storage Server 5.2 SP2
- Avaya Messaging Storage Server 5.2 SP3
- Avaya Message Networking 5.2 SP1
- Avaya Meeting Exchange 5.0
- Avaya Voice Portal 4.0
- Avaya Voice Portal 4.1
- IBM Java SE 6.0
- Sun JRE (Linux Production Release) 1.6.0 11
- Sun JRE (Solaris Production Release) 1.6.0 11
- Sun JRE (Windows Production Release) 1.6.0 11
- VMWare ESX 4.0
- VMWare ESX 4.1
- Sun JDK (Linux Production Release) 1.6.0 10
- Sun JDK (Linux Production Release) 1.6.0 11
- Avaya Aura System Manager 6.1.1
- SuSE SUSE Linux Enterprise Java 10 SP4
- SuSE SUSE Linux Enterprise Java 11 SP1
- Avaya Voice Portal 5.1.2
- Avaya Aura Communication Manager 5.1
- Avaya Meeting Exchange 5.0.0.0.52
- Avaya Voice Portal 5.0 SP2
- Avaya Messaging Application Server 5.2
- Avaya Aura Conferencing 6.0.0 Standard
- Avaya Aura Communication Manager 4.0
- Avaya Aura Communication Manager 4.0
- Avaya Voice Portal 4.1 SP1
- Avaya Voice Portal 4.1 SP2
- Avaya Voice Portal 5.1
- Ubuntu Ubuntu Linux 10.10 amd64
- Ubuntu Ubuntu Linux 10.10 powerpc
- VMWare vCenter 4.1
- OpenJDK 6
- Ubuntu Ubuntu Linux 10.10 i386
- HP HP-UX B.11.11
- Apple Mac Os X 10.7.2
- HP HP-UX B.11.23
- Sun JRE (Linux Production Release) 1.6.0 04
- Sun JDK (Linux Production Release) 1.6.0 04
- Sun JDK (Linux Production Release) 1.6.0
- Avaya CMS Server 16.0
- Avaya Aura Session Manager 5.2
- Avaya Aura SIP Enablement Services 4.0
- Sun JRE (Linux Production Release) 1.6.0 20
- Sun JRE (Windows Production Release) 1.6.0 20
- Avaya Aura Application Enablement Services 5.2
- Avaya Message Networking 5.2
- Sun JRE (Windows Production Release) 1.6.0 15
- Apple Mac Os X 10.7.1
- Apple Mac Os X Server 10.7
- Apple Mac Os X Server 10.7.1
- Apple Mac Os X Server 10.7.2
- Sun JDK (Linux Production Release) 1.6.0 13
- Avaya CMS Server 16.1
- Sun JDK (Solaris Production Release) 1.6.0 02
- Sun JDK (Linux Production Release) 1.6.0_27
- Sun JDK (Solaris Production Release) 1.6.0_27
- Sun JDK (Windows Production Release) 1.6.0_27
- Mandriva Enterprise Server 5
- HP Network Node Manager i 9.1
- Sun JRE (Linux Production Release) 1.6.0_27
- Sun JRE (Solaris Production Release) 1.6.0_27
- Sun JRE (Windows Production Release) 1.6.0_27
- Sun JRE (Linux Production Release) 1.7
- Sun JRE (Solaris Production Release) 1.7
- Sun JRE (Windows Production Release) 1.7
- Avaya Aura System Platform 6.0
- Sun JDK (Windows Production Release) 1.6.0 01-B06
- Sun JDK (Linux Production Release) 1.6.0 17
- IBM Java SE 6.0 SR6
- IBM Java SE 6.0 SR7
- Avaya Aura Session Manager 6.0 SP1
- Sun JDK (Linux Production Release) 1.6.0 01-B06
- Sun JRE (Solaris Production Release) 1.6.0_22
- Gentoo Linux
- Sun JDK (Linux Production Release) 1.6.0 14
- Avaya CMS Server 16.2
- SuSE SUSE Linux Enterprise Server 11 SP1
- SuSE SUSE Linux Enterprise SDK 11 SP1
- Ubuntu Ubuntu Linux 11.10 amd64
- Ubuntu Ubuntu Linux 11.10 i386
- Avaya Aura Session Manager 6.0
- Sun JRE (Solaris Production Release) 1.6.0 2
- Avaya Aura Application Enablement Services 5.2.2
- Sun JRE (Windows Production Release) 1.6.0 2
- Avaya Aura System Manager 6.1 SP2
- Avaya Proactive Contact 4.1.2
- IBM Java SE 6.0.0 SR9-FP2
- Apple Mac OS X 10.6.4
- Apple Mac OS X Server 10.6.4
- Xerox FreeFlow Print Server (FFPS) 73.C0.41
- Avaya IQ 5.1
- Apple Mac Os X 10.6.7
- Apple Mac Os X Server 10.6.7
- Sun JDK (Solaris Production Release) 1.6.0 01-B06
- Avaya Proactive Contact 4.0
- Red Hat Enterprise Linux Desktop 5 Client
- Red Hat Enterprise Linux Supplementary 5 Server
- Sun JDK (Solaris Production Release) 1.6.0 10
- Sun JDK (Windows Production Release) 1.6.0 10
- Sun JDK (Solaris Production Release) 1.6.0 04
- Sun JDK (Windows Production Release) 1.6.0 04
- Sun JDK (Solaris Production Release) 1.6.0 14
- Sun JDK (Windows Production Release) 1.6.0 14
- Sun JDK (Solaris Production Release) 1.6.0 13
- Sun JDK (Windows Production Release) 1.6.0 13
- Sun JDK (Solaris Production Release) 1.6.0 11
- Sun JDK (Windows Production Release) 1.6.0 11
- Sun JRE (Linux Production Release) 1.6.0 13
- VMWare VirtualCenter 2.5
- Sun JDK (Windows Production Release) 1.6.0 05
- Sun JDK (Windows Production Release) 1.6.0 06
- Sun JDK (Solaris Production Release) 1.6.0 06
- Sun JDK (Solaris Production Release) 1.6.0 07
- Sun JDK (Windows Production Release) 1.6.0 07
- Sun JDK (Solaris Production Release) 1.6.0
- Sun JDK (Windows Production Release) 1.6.0
- Sun JDK (Solaris Production Release) 1.7.0
- Sun JDK (Windows Production Release) 1.7.0
- Sun JRE (Solaris Production Release) 1.6.0
- Sun JRE (Windows Production Release) 1.6.0
- Sun JRE (Solaris Production Release) 1.6.0 10
- Sun JRE (Windows Production Release) 1.6.0 10
- Sun JRE (Solaris Production Release) 1.6.0 12
- Sun JRE (Windows Production Release) 1.6.0 12
- Sun JRE (Solaris Production Release) 1.6.0 13
- Sun JRE (Windows Production Release) 1.6.0 13
- Sun JRE (Solaris Production Release) 1.6.0 04
- Sun JRE (Windows Production Release) 1.6.0 04
- Sun JRE (Solaris Production Release) 1.6.0 05
- Sun JRE (Windows Production Release) 1.6.0 05
- Sun JRE (Solaris Production Release) 1.6.0 06
- Sun JRE (Windows Production Release) 1.6.0 06
- Sun JRE (Solaris Production Release) 1.6.0 07
- Sun JRE (Windows Production Release) 1.6.0 07
- IBM Java SE 7
- IBM Java SE 6
- HP HP-UX B.11.31
- Avaya IP Office Application Server 6.1
- Avaya Aura Session Manager 1.1
- Avaya Meeting Exchange 5.2
- Red Hat Fedora 16
- Avaya Aura Application Enablement Services 5.2.3
- Avaya IQ 5.2
- Avaya Aura System Platform 6.0 SP2
- Avaya Aura System Platform 6.0 SP3
- Sun JDK (Linux Production Release) 1.6.0_21
- Sun JDK (Linux Production Release) 1.6.0_22
- Sun JDK (Solaris Production Release) 1.6.0_21
- Sun JDK (Solaris Production Release) 1.6.0_22
- VMWare vCenter 4.0
- Sun JDK (Windows Production Release) 1.6.0_21
- Sun JDK (Windows Production Release) 1.6.0_22
- Mandriva Enterprise Server 5 X86 64
- Sun JRE (Linux Production Release) 1.6.0_21
- Sun JRE (Linux Production Release) 1.6.0_22
- Sun JRE (Solaris Production Release) 1.6.0_21
- Sun JDK (Solaris Production Release) 1.6.0_25
- Sun JDK (Windows Production Release) 1.6.0_25
- VMWare vCenter 5.0
- VMWare Update Manager 5.0
- Sun JRE (Windows Production Release) 1.6.0_22
- Sun JRE (Solaris Production Release) 1.6.0_25
- Sun JRE (Windows Production Release) 1.6.0_25
- Sun JDK (Windows Production Release) 1.6.0 18
- Sun JDK (Solaris Production Release) 1.6.0 18
- VMWare ESX 3.5
- Sun JDK (Linux Production Release) 1.6.0 18
- Sun JRE (Linux Production Release) 1.6.0 18
- Sun JRE (Windows Production Release) 1.6.0 18
- Sun JRE (Solaris Production Release) 1.6.0 18
- Avaya Aura Presence Services 6.1.1
- Sun JDK (Linux Production Release) 1.6.0 02
- Sun JDK (Windows Production Release) 1.6.0 02
- Sun JRE (Linux Production Release) 1.6.0 01
- Sun JRE (Linux Production Release) 1.6.0 02
- Sun JRE (Solaris Production Release) 1.6.0 01
- Sun JRE (Solaris Production Release) 1.6.0 02
- Sun JRE (Windows Production Release) 1.6.0 01
- Sun JRE (Windows Production Release) 1.6.0 02
- Avaya Voice Portal 5.1
- Avaya Meeting Exchange 5.1
- Sun JDK (Solaris Production Release) 1.6.0 03
- Sun JDK (Linux Production Release) 1.6.0 03
- Sun JDK (Linux Production Release) 1.6.0_25
- Avaya IQ 5
- Sun JDK (Windows Production Release) 1.6.0 03
- Sun JRE (Linux Production Release) 1.6.0 03
- Sun JRE (Solaris Production Release) 1.6.0 03
- Sun JRE (Windows Production Release) 1.6.0 03
- Ubuntu Ubuntu Linux 10.04 ARM
- Ubuntu Ubuntu Linux 10.10 ARM
- Avaya Message Networking 5.2.1
- Avaya Message Networking 5.2.3
- Avaya Aura System Platform 6.0.1
- Avaya Aura System Platform 6.0.2
- Avaya Aura Application Enablement Services 6.1.1
- Avaya Voice Portal 5.1.1
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Red Hat Enterprise Linux 5 Server
- Sun JDK (Windows Production Release) 1.6.0 01
- Sun JDK (Linux Production Release) 1.6.0 01
- Avaya Aura Application Enablement Services 5.2.1
- Avaya Aura Session Manager 6.1.1
- Avaya Aura Session Manager 6.1.2
- Avaya Proactive Contact 4.2.2
- Avaya Aura Messaging 6.0
- Avaya Aura Messaging 6.0.1
- Avaya Aura Session Manager 6.1.3
- Avaya Aura System Manager 6.1.2
- Avaya Aura System Manager 6.1.3
- Avaya IQ 5.1.1
- Xerox FreeFlow Print Server (FFPS) 73.B3.61
- Sun JDK (Linux Production Release) 1.6.0_26
- Sun JDK (Solaris Production Release) 1.6.0_26
- Sun JDK (Windows Production Release) 1.6.0_26
- Sun JRE (Linux Production Release) 1.6.0_26
- Sun JRE (Solaris Production Release) 1.6.0_26
- Sun JRE (Windows Production Release) 1.6.0_26
- Sun JDK (Linux Production Release) 1.6.0 15
- Sun JDK (Windows Production Release) 1.6.0 15
- Sun JDK (Solaris Production Release) 1.6.0 15
- Sun JRE (Solaris Production Release) 1.6.0 15
- Avaya Meeting Exchange 5.2 SP1
- Sun JRE (Linux Production Release) 1.6.0 15
- Ubuntu Ubuntu Linux 10.04 Amd64
- Ubuntu Ubuntu Linux 10.04 I386
- Ubuntu Ubuntu Linux 10.04 Powerpc
- Ubuntu Ubuntu Linux 10.04 Sparc
- Red Hat Enterprise Linux Extras 4
- Mandriva Linux Mandrake 2010.1 X86 64
- Mandriva Linux Mandrake 2010.1
- Debian Linux 6.0 s/390
- Avaya Aura Application Server 5300 SIP Core 2.0
- Avaya IP Office Application Server 7.0
- SuSE SUSE Linux Enterprise Server for VMware 11 SP1
- Sun JRE (Linux Production Release) 1.6.0 17
- Sun JRE (Solaris Production Release) 1.6.0 17
- Sun JRE (Windows Production Release) 1.6.0 17
- Avaya Aura Communication Manager Utility Services 6.1
- Avaya Voice Portal 5.1 SP1
- Sun JDK (Solaris Production Release) 1.6.0 17
- Sun JDK (Windows Production Release) 1.6.0 17
- Avaya CMS Server 15.0 AUX
- Avaya Aura Communication Manager 5.2
- Avaya Aura Communication Manager 5.2.1
- Avaya Aura SIP Enablement Services 5.2.1
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Oracle Java. The vulnerability is due to the insecure getContextClassLoader() method in the JNDI component. A remote unauthenticated attacker can exploit this vulnerability by enticing a user to visit a webpage containing a maliciously crafted Java applet. Successful exploitation could result in arbitrary code execution in the context of the currently logged in user.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- oracle jdk 1.7.0 (update_45)
- oracle jre 1.5.0 (update_55)
- oracle jdk 1.5.0 (update_55)
- oracle jre 1.6.0 (update_65)
- oracle jdk 1.6.0 (update_65)
- oracle jre 1.7.0 (update_45)
HTTP:STC:ADOBE:U3D-TEXTURE-BOF1 - HTTP: Adobe Acrobat Reader U3D Texture Parsing Buffer Overflow1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Adobe PDF Reader. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
HTTP:STC:DL:XLS-WOPT - HTTP: Microsoft Office Excel WOPT Record Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Microsoft Office Excel. It is due to a flaw while parsing crafted WOpt records in an Excel file. Remote attackers can exploit this by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current logged on user.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Avaya Messaging Application Server MM 3.1
- Avaya Messaging Application Server 4
- Microsoft Excel 2002 SP1
- Avaya Messaging Application Server
- Microsoft Excel 2002 SP2
- Microsoft Excel 2002 SP3
- Microsoft Office 2004 for Mac
- Microsoft Excel 2002
- Avaya Messaging Application Server 5
- Avaya Messaging Application Server MM 2.0
- Avaya Messaging Application Server MM 1.1
- Avaya Meeting Exchange - Client Registration Server
- Avaya Meeting Exchange - Recording Server
- Avaya Meeting Exchange - Streaming Server
- Avaya Meeting Exchange - Web Conferencing Server
- Avaya Meeting Exchange - Webportal
- Avaya Messaging Application Server MM 3.0
HTTP:STC:ADOBE:READER-BMP - HTTP: Adobe Acrobat and Reader PDF BMP Image Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Reader. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Adobe Reader 9.4.5
- Adobe Acrobat 9.3.4
- Adobe Reader 9.1.2
- Adobe Acrobat Standard 9.1.2
- Adobe Acrobat Professional 9.1.2
- Adobe Acrobat 9.3.4
- Adobe Acrobat 10.0.1
- Adobe Acrobat 9.4.2
- Adobe Acrobat Professional 10.0.1
- Adobe Acrobat Professional 9.4.2
- Adobe Acrobat Standard 10.0.1
- Adobe Acrobat Standard 9.4.2
- Adobe Reader 10.0.1
- Adobe Reader 9.4.2
- Adobe Acrobat Standard 9.3
- Adobe Acrobat 9.3
- Adobe Reader 9.3
- Adobe Acrobat Professional 9.3
- Adobe Reader 9.2
- Adobe Acrobat Professional 9.2
- Adobe Acrobat Standard 9.2
- Adobe Acrobat 9.3.3
- Adobe Acrobat 9.4.1
- Adobe Acrobat Professional 9.4.1
- Adobe Acrobat Standard 9.4.1
- Adobe Reader 9.4.1
- Adobe Reader 9.3.2
- Adobe Acrobat Standard 9.3.2
- Adobe Acrobat Professional 9.3.2
- Adobe Acrobat 9.3.2
- Adobe Reader 9
- Adobe Reader 9.4
- Adobe Acrobat 9.1.1
- Adobe Reader 9.4.3
- Adobe Acrobat Professional 9.4
- Adobe Acrobat Standard 9.3.4
- Adobe Acrobat Professional 9.3.4
- Adobe Reader 9.3.4
- Adobe Acrobat Standard 9.3.4
- Adobe Reader 9.3.4
- Adobe Acrobat 10.1.1
- Adobe Acrobat Professional 10.1.1
- Adobe Acrobat Standard 10.1.1
- Adobe Reader 10.1.1
- Adobe Acrobat 9.4.6
- Adobe Acrobat Professional 9.4.6
- Adobe Acrobat Standard 9.4.6
- Adobe Reader 9.4.6
- Adobe Reader 9.1
- Adobe Acrobat Professional 9.1
- Adobe Acrobat Standard 9.1
- Adobe Reader 9.3.3
- Adobe Acrobat 9.3.3
- Adobe Acrobat Professional 9.3.3
- Adobe Acrobat Standard 9.3.3
- Adobe Acrobat Professional 10.0
- Adobe Reader 9.3.1
- Adobe Acrobat Professional 9.3.1
- Adobe Acrobat Standard 9.3.1
- Adobe Reader 9.1.1
- Adobe Acrobat 9.4
- Adobe Reader 9.1.3
- Adobe Acrobat Professional 9.1.3
- Adobe Acrobat Standard 9.1.3
- Gentoo Linux
- Adobe Acrobat 9
- Adobe Acrobat 9.4.7
- Adobe Acrobat Professional 9.4.7
- Adobe Acrobat Standard 9.4.7
- Adobe Reader 9.4.7
- Adobe Acrobat 10.0.3
- Adobe Acrobat Professional 10.0.3
- Adobe Acrobat Standard 10.0.3
- Adobe Reader 10.0.3
- Adobe Acrobat Standard 9.4
- Adobe Reader 9.4.4
- Adobe Acrobat Standard 9.4.3
- Adobe Acrobat Standard 9.4.4
- Adobe Acrobat Professional 9.4.3
- Adobe Acrobat Professional 9.4.4
- Adobe Acrobat 9.4.3
- Adobe Acrobat 9.4.4
- Adobe Acrobat 9.3.1
- Adobe Acrobat 10.0.2
- Adobe Acrobat Professional 10.0.2
- Adobe Acrobat Standard 10.0.2
- Adobe Reader 10.0.2
- Adobe Acrobat 10.1
- Adobe Acrobat Professional 10.1
- Adobe Acrobat Standard 10.1
- Adobe Reader 10.1
- Adobe Acrobat 10.0
- Adobe Acrobat 9.4.5
- Adobe Acrobat Standard 10.0
- Adobe Reader 10.0
- Adobe Acrobat Professional 9.4.5
- Adobe Acrobat 9.2
- Adobe Acrobat Standard 9.4.5
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Adobe Reader. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- adobe acrobat 11.0
- adobe acrobat 10.0.2
- adobe acrobat 10.0.1 (-:pro)
- adobe acrobat 10.1.6
- adobe acrobat_reader 10.1.7
- adobe acrobat_reader 11.0.2
- adobe acrobat_reader 10.1
- adobe acrobat_reader 11.0.3
- adobe acrobat 10.1.4
- adobe acrobat_reader 10.0
- adobe acrobat 10.1.7
- adobe acrobat 10.0 (-:pro)
- adobe acrobat 10.1.3
- adobe acrobat_reader 11.0.1
- adobe acrobat 10.1.2
- adobe acrobat 10.1.1
- adobe acrobat_reader 10.1.2
- adobe acrobat_reader 10.1.4
- adobe acrobat_reader 10.1.3
- adobe acrobat 11.0.3
- adobe acrobat 10.0.3
- adobe acrobat_reader 10.1.1
- adobe acrobat 11.0.2
- adobe acrobat_reader 10.1.6
- adobe acrobat 11.0.1
- adobe acrobat_reader 10.0.2
- adobe acrobat_reader 10.0.1
- adobe acrobat_reader 10.1.5
- adobe acrobat_reader 10.0.3
- adobe acrobat 10.1
- adobe acrobat_reader 11.0
- adobe acrobat 10.1.5
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Adobe FlashPlayer. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- adobe adobe_air 3.0.0.4080
- adobe flash_player 11.6.602.171
- adobe adobe_air_sdk 3.6.0.6090
- adobe flash_player 11.1.111.50
- adobe flash_player 11.5.502.149
- adobe adobe_air 3.7.0.1860
- adobe flash_player up to 11.1.111.64
- adobe flash_player 11.1.115.48
- adobe flash_player 11.2.202.236
- adobe flash_player 11.1.111.54
- adobe flash_player 11.1.102.62
- adobe flash_player 11.5.502.110
- adobe adobe_air 3.0.0.408
- adobe flash_player 11.3.300.270
- adobe flash_player 11.2.202.275
- adobe flash_player 11.2.202.238
- adobe adobe_air 3.1.0.485
- adobe flash_player 11.2.202.273
- adobe flash_player 11.1.111.44
- adobe flash_player 11.1
- adobe flash_player up to 11.2.202.297
- adobe flash_player 11.7.700.224
- adobe flash_player 11.3.300.265
- adobe flash_player up to 11.8.800.94
- adobe flash_player 11.4.402.287
- adobe flash_player 11.2.202.261
- adobe adobe_air_sdk 3.0.0.4080
- adobe flash_player 11.1.115.7
- adobe adobe_air 3.6.0.6090
- adobe adobe_air_sdk 3.3.0.3650
- adobe adobe_air_sdk 3.3.0.3690
- adobe adobe_air_sdk 3.5.0.600
- adobe adobe_air_sdk 3.4.0.2710
- adobe adobe_air_sdk 3.4.0.2540
- adobe flash_player 11.1.111.8
- adobe flash_player 11.1.115.58
- adobe flash_player 11.2.202.280
- adobe flash_player 11.6.602.168
- adobe adobe_air 3.5.0.600
- adobe adobe_air 3.4.0.2710
- adobe flash_player 11.1.115.54
- adobe flash_player 11.4.402.278
- adobe adobe_air 3.2.0.207
- adobe flash_player 11.2.202.258
- adobe adobe_air_sdk up to 3.8.0.910
- adobe flash_player 11.5.502.136
- adobe flash_player 11.0.1.153
- adobe flash_player 11.7.700.225
- adobe flash_player 11.7.700.202
- adobe flash_player 11.1.115.63
- adobe flash_player 11.2.202.223
- adobe flash_player 11.2.202.233
- adobe adobe_air up to 3.8.0.910
- adobe flash_player up to 11.7.700.232
- adobe adobe_air 3.4.0.2540
- adobe adobe_air 3.2.0.2070
- adobe flash_player 11.1.102.63
- adobe adobe_air_sdk 3.1.0.488
- adobe flash_player 11.2.202.235
- adobe adobe_air 3.3.0.3670
- adobe adobe_air_sdk 3.7.0.1860
- adobe flash_player 11.3.300.271
- adobe adobe_air_sdk 3.2.0.2070
- adobe flash_player 11.3.300.273
- adobe flash_player 11.7.700.169
- adobe flash_player 11.0
- adobe flash_player 11.2.202.291
- adobe adobe_air 3.1.0.488
- adobe adobe_air_sdk 3.5.0.880
- adobe flash_player 11.2.202.270
- adobe adobe_air up to 3.8.0.870
- adobe flash_player 11.1.115.34
- adobe flash_player 11.1.102.55
- adobe flash_player 11.5.502.146
- adobe flash_player 11.3.300.262
- adobe adobe_air 3.7.0.2090
- adobe flash_player 11.2.202.262
- adobe adobe_air_sdk up to 3.8.0.870
- adobe flash_player 11.2.202.251
- adobe adobe_air_sdk 3.6.0.599
- adobe adobe_air 3.5.0.880
- adobe flash_player 11.2.202.228
- adobe adobe_air_sdk 3.5.0.890
- adobe adobe_air_sdk 3.7.0.2090
- adobe flash_player up to 11.1.115.69
- adobe adobe_air 3.6.0.597
- adobe flash_player 11.6.602.167
- adobe adobe_air 3.5.0.1060
- adobe adobe_air_sdk 3.7.0.1530
- adobe flash_player 11.3.300.268
- adobe flash_player 11.4.402.265
- adobe flash_player 11.1.102.59
- adobe adobe_air 3.1.0.4880
- adobe flash_player 11.2.202.285
- adobe flash_player 11.3.300.257
- adobe flash_player 11.5.502.135
- adobe adobe_air 3.5.0.890
- adobe flash_player 11.2.202.243
- adobe adobe_air 3.7.0.1530
- adobe flash_player 11.6.602.180
- adobe adobe_air_sdk 3.5.0.1060
- adobe flash_player 11.0.1.152
HTTP:STC:DL:OTF-BO - HTTP: Microsoft Windows Embedded OpenType Font Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Microsoft Windows Embedded OpenType Font. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- Microsoft Windows XP Professional
- Microsoft Windows XP Home
- Microsoft Windows Vista Business SP2
- Microsoft Windows Vista Business 64-bit edition SP2
- Microsoft Windows Vista Enterprise 64-bit edition SP2
- Microsoft Windows Vista Enterprise SP2
- Microsoft Windows Vista Home Basic 64-bit edition SP2
- Microsoft Windows Vista Home Basic SP2
- Microsoft Windows Vista Home Premium 64-bit edition SP2
- Microsoft Windows Vista Home Premium SP2
- Microsoft Windows Vista SP2
- Microsoft Windows Vista Ultimate 64-bit edition SP2
- Microsoft Windows Vista Ultimate SP2
- Microsoft Windows Vista x64 Edition SP2
- Microsoft Windows Server 2008 Datacenter Edition SP2
- Microsoft Windows Server 2008 Enterprise Edition SP2
- Microsoft Windows Server 2008 Standard Edition SP2
- Microsoft Windows Server 2008 for 32-bit Systems SP2
- Microsoft Windows Server 2008 for Itanium-based Systems SP2
- Microsoft Windows Server 2008 for x64-based Systems SP2
- Nortel Networks Contact Center - Contact Recording
- Nortel Networks Contact Center - Quality Monitoring
- Nortel Networks Self-Service MPS 100
- Nortel Networks Self-Service MPS 500
- Microsoft Windows Server 2003 x64 SP2
- Nortel Networks Self-Service Speech Server
- Nortel Networks TAPI Desktop
- Nortel Networks Contact Center - TAPI Server
- Nortel Networks Contact Center - Agent Desktop Display
- Nortel Networks Contact Center Manager Server
- Nortel Networks Self-Service Peri Application
- Nortel Networks Contact Center - CCT
- Nortel Networks Self-Service CCXML
- Nortel Networks Self Service VoiceXML
- Microsoft Windows Server 2008 Datacenter Edition
- Microsoft Windows Server 2008 Enterprise Edition
- Microsoft Windows Server 2008 Datacenter Edition Release Candidate
- Microsoft Windows Vista Business SP1
- Microsoft Windows Vista Home Basic SP1
- Microsoft Windows Vista Home Premium SP1
- Microsoft Windows Vista Enterprise SP1
- Microsoft Windows Vista Ultimate SP1
- Microsoft Windows Vista Business 64-bit edition SP1
- Microsoft Windows Vista Enterprise 64-bit edition SP1
- Microsoft Windows Vista Home Basic 64-bit edition SP1
- Microsoft Windows Vista Home Premium 64-bit edition SP1
- Microsoft Windows Vista Ultimate 64-bit edition SP1
- Microsoft Windows Server 2003 x64 SP1
- Microsoft Windows Vista x64 Edition
- Microsoft Windows Server 2003 Web Edition SP2
- Microsoft Windows XP Professional x64 Edition SP2
- Microsoft Windows Server 2003 Itanium
- Microsoft Windows Server 2003 Itanium SP1
- Microsoft Windows Server 2003 Itanium SP2
- Microsoft Windows Server 2003 Datacenter x64 Edition SP2
- Microsoft Windows Server 2003 Enterprise x64 Edition SP2
- Microsoft Windows Server 2003 Standard Edition SP2
- Microsoft Windows XP Tablet PC Edition SP1
- Microsoft Windows 2000 Professional
- Nortel Networks Self-Service Peri Workstation
- Nortel Networks Self-Service WVADS
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows XP Media Center Edition
- Microsoft Windows XP Tablet PC Edition
- Microsoft Windows Vista x64 Edition SP1
- Microsoft Windows Server 2003 Enterprise x64 Edition
- Microsoft Windows Vista Beta 2
- Microsoft Windows XP 64-bit Edition
- Microsoft Windows XP Home SP1
- Microsoft Windows XP Professional SP1
- Microsoft Windows XP Tablet PC Edition SP3
- Microsoft Windows XP Professional SP3
- Microsoft Windows XP Media Center Edition SP3
- Microsoft Windows XP Home SP3
- Microsoft Windows Server 2003 Datacenter Edition SP1
- Microsoft Windows Server 2003 Datacenter Edition Itanium SP1
- Microsoft Windows Server 2003 Enterprise Edition Itanium SP1
- Microsoft Windows Server 2003 Enterprise Edition SP1
- Microsoft Windows Server 2003 Standard Edition SP1
- Microsoft Windows Server 2003 Web Edition SP1
- Microsoft Windows XP Home SP2
- Nortel Networks Contact Center Administration
- Nortel Networks Self-Service MPS 1000
- Microsoft Windows Server 2003 Enterprise Edition
- Microsoft Windows Server 2003 Datacenter Edition
- Microsoft Windows Server 2003 Web Edition
- Microsoft Windows Server 2003 Enterprise Edition Itanium
- Microsoft Windows Server 2003 Datacenter Edition Itanium
- Nortel Networks Self-Service Media Processing Server
- Microsoft Windows Vista SP2 Beta
- Microsoft Windows 2000 Professional SP3
- Microsoft Windows 2000 Server SP3
- Microsoft Windows 2000 Advanced Server SP3
- Microsoft Windows 2000 Datacenter Server SP3
- Microsoft Windows XP 64-bit Edition SP1
- Microsoft Windows 2000 Datacenter Server SP1
- Nortel Networks Contact Center NCC
- Microsoft Windows XP Tablet PC Edition SP2
- Microsoft Windows 2000 Server
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Advanced Server SP4
- Microsoft Windows 2000 Datacenter Server SP4
- Microsoft Windows 2000 Professional SP4
- Microsoft Windows 2000 Server SP4
- Microsoft Windows Vista Beta
- Nortel Networks CallPilot 703T
- Nortel Networks CallPilot 201I
- Nortel Networks Contact Center
- Nortel Networks Self-Service
- Microsoft Windows Server 2003 Datacenter Edition SP1 Beta 1
- Microsoft Windows Server 2003 Datacenter Edition Itanium SP1 Beta 1
- Microsoft Windows Server 2003 Enterprise Edition Itanium SP1 Beta 1
- Microsoft Windows Server 2003 Enterprise Edition SP1 Beta 1
- Microsoft Windows Server 2003 Standard Edition SP1 Beta 1
- Microsoft Windows Server 2003 SP1
- Microsoft Windows Server 2003 SP2
- Microsoft Windows XP Gold
- Nortel Networks Contact Center Administration CCMA 6.0
- Nortel Networks Self-Service - Peri Application Rel 3.0
- Nortel Networks Self-Service - CCSS7
- Microsoft Windows Server 2003 Standard x64 Edition
- Nortel Networks Contact Center - CCT 5
- Microsoft Windows XP Professional SP2
- Microsoft Windows XP Media Center Edition SP1
- Microsoft Windows XP Media Center Edition SP2
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows Vista SP1
- Nortel Networks Symposium TAPI Service Provider
- Nortel Networks Symposium Agent
- Nortel Networks CallPilot 1005R
- Nortel Networks CallPilot 600R
- Microsoft Windows Vista Ultimate
- Microsoft Windows Vista Home Premium
- Microsoft Windows Vista Home Basic
- Microsoft Windows Vista Business
- Microsoft Windows Vista Enterprise
- Microsoft Windows Server 2003 Standard Edition
- Nortel Networks CallPilot 202I
- Nortel Networks Contact Center Express
- Nortel Networks Contact Center Multimedia
- Nortel Networks Contact Center Web Client
- Nortel Networks Contact Center Manager
- Microsoft Windows Server 2003 Datacenter x64 Edition
- Microsoft Windows XP Professional x64 Edition
- Microsoft Windows Server 2003 Web Edition SP1 Beta 1
- Microsoft Windows Vista Business 64-bit edition
- Microsoft Windows Vista Enterprise 64-bit edition
- Microsoft Windows Vista Home Basic 64-bit edition
- Microsoft Windows Vista Home Premium 64-bit edition
- Microsoft Windows Vista Ultimate 64-bit edition
- Microsoft Windows Vista
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Server SP2
- Microsoft Windows Server 2008 Standard Edition Release Candidate
- Microsoft Windows Vista Beta 1
- Microsoft Windows Server 2008 Enterprise Edition Release Candidate
- Microsoft Windows Server 2008 Standard Edition
- Microsoft Windows Server 2008 for 32-bit Systems
- Microsoft Windows Server 2008 for x64-based Systems
- Microsoft Windows Server 2008 for Itanium-based Systems
- Microsoft Windows XP
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against ClamAV antivirus. A successful attack can result in a denial-of-service condition.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- canonical ubuntu_linux 14.10
- canonical ubuntu_linux 14.04
- canonical ubuntu_linux 15.04
- clamav 0.98.6
- canonical ubuntu_linux 12.04
HTTP:STC:SILVERLIGHT-MEM-COR - HTTP: Microsoft Silverlight Pointer Dereference Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Silverlight. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- microsoft silverlight 5.0.60401.0
- microsoft silverlight up to 5.0.61118.0
- microsoft silverlight 5.0.60818.0 (rc)
HTTP:STC:ADOBE:CAM-RAW-PLUGIN - HTTP: Adobe Camera Raw Plug-in TIFF Image Processing Buffer Underflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Camera Raw Plug-in. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- adobe camera_raw 5.2
- adobe camera_raw 5.4
- adobe camera_raw 5.1
- adobe camera_raw 4.5
- adobe camera_raw 4.2
- adobe camera_raw 2.1
- adobe camera_raw 2.2
- adobe camera_raw 4.0
- adobe camera_raw 2.3
- adobe camera_raw 4.1
- adobe camera_raw 2.4
- adobe camera_raw 4.4.1
- adobe camera_raw 4.3.1
- adobe camera_raw 3.5
- adobe camera_raw 3.4
- adobe camera_raw up to 7.2
- adobe camera_raw 3.7
- adobe camera_raw 5.5
- adobe camera_raw 5.0
- adobe camera_raw 4.6
- adobe camera_raw 3.6
- adobe camera_raw 3.1
- adobe camera_raw 3.3
- adobe camera_raw 5.3
- adobe camera_raw 3.2
HTTP:STC:JAVA:NXT-UPDTE-RA - HTTP: Oracle Java SE OCSP nextUpdate Replay Attack
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against Oracle Java. A successful exploit will have the impact on confidentiality, integrity and availability of the data.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- oracle jdk 1.7.0
- oracle jre 1.7.0
- oracle jdk 1.8.0
- oracle jre 1.8.0
- oracle jrockit r28.3.6
- oracle jre 1.6.0
- oracle jdk 1.6.0
HTTP:STC:MS-CVE-2014-4121-RCE - HTTP: Microsoft .NET Framework CVE-2014-4121 Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Microsoft .NET Framework. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- microsoft .net_framework 4.5.2
- microsoft .net_framework 3.5.1
- microsoft .net_framework 4.0
- microsoft .net_framework 3.5
- microsoft .net_framework 4.5.1
- microsoft .net_framework 2.0
- microsoft .net_framework 4.5
HTTP:MANAGENGINE-EVENTLOG-CSRF - HTTP: ManageEngine EventLog Analyzer Cross Site Request Forgery
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against ManageEngine EventLog Analyzer. A successful exploit could allow the attacker to submit arbitrary requests to the affected system via the web browser with the privileges of the user.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
HTTP:STC:DL:MS-PUB-MC - HTTP: Microsoft Publisher PUB File Processing Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Publisher. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Office XP
- HP Storage Management Appliance 2.1
- Microsoft Office XP SP3
- Microsoft Office 2003 SP1
- Microsoft Publisher 2002
- Microsoft Publisher 2003
- Microsoft Office 2000 SP1
- Microsoft Office 2000 SP2
- Microsoft Office XP SP1
- Microsoft Office 2003 SP2
- Microsoft Publisher 2000
- Microsoft Office 2000 SP3
- Microsoft Office XP SP2
- Microsoft Office 2000
- Microsoft Office 2003
HTTP:STC:ADOBE:SWF-XLS-MALF - HTTP: Adobe Flash Player Malformed XLS File Corruption Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Adobe AIR 2.0.3
- Adobe Flash Player 10.1.82.76
- Adobe Acrobat 9.3.3
- Adobe Acrobat 9.3.4
- Adobe AIR 1.0
- Sun OpenSolaris Build Snv 99
- Red Hat Enterprise Linux Supplementary 5 Server
- Red Hat Enterprise Linux Desktop Supplementary 6
- Adobe Flash Player 10.0.45.2
- Adobe Flash Player 10.1 Release Candidate
- Adobe Reader 9.1.2
- Adobe Acrobat Standard 9.1.2
- Sun OpenSolaris Build Snv 101A
- Sun OpenSolaris Build Snv 112
- Adobe Acrobat Professional 9.1.2
- Adobe Acrobat Standard 9
- Sun OpenSolaris Build Snv 123
- Sun OpenSolaris Build Snv 121
- Adobe Acrobat 9.3.4
- Adobe Reader 9.1.3
- Adobe Acrobat 10.0.1
- Adobe Acrobat 9.4.2
- Adobe Acrobat Professional 10.0.1
- Adobe Acrobat Professional 9.4.2
- Adobe Acrobat Standard 10.0.1
- Adobe Acrobat Standard 9.4.2
- Adobe Reader 10.0.1
- Adobe Reader 9.4.2
- Adobe Flash Player 10.2.152.21
- Adobe Flash Player 10.1.106.16
- Sun OpenSolaris Build Snv 48
- Adobe Acrobat Standard 9.3
- Adobe Acrobat 9.3
- Adobe Reader 9.3
- Adobe Acrobat Professional 9.3
- Sun OpenSolaris Build Snv 122
- Sun OpenSolaris Build Snv 71
- Adobe Reader 9
- Adobe AIR 1.01
- Adobe Acrobat Professional 9.2
- Adobe Acrobat Standard 9.2
- Sun OpenSolaris Build Snv 49
- Adobe Reader 9.2
- Adobe Flash Player 10.0.12 .35
- Adobe Flash Player 10.0.12.10
- Adobe AIR 1.1
- Adobe AIR 1.5
- Adobe Acrobat 9.3.3
- Adobe Acrobat Professional 9.1
- Sun OpenSolaris Build Snv 128
- Adobe Flash Player 10
- Sun OpenSolaris Build Snv 41
- Adobe Acrobat 9.4.1
- Adobe Acrobat Professional 9.4.1
- Adobe Acrobat Standard 9.4.1
- Adobe Reader 9.4.1
- Adobe Acrobat 9
- Adobe Acrobat Standard 9.3.2
- Adobe Acrobat Professional 9.3.2
- Adobe Acrobat 9.3.2
- Adobe Reader 9
- Sun OpenSolaris Build Snv 134
- Sun OpenSolaris Build Snv 135
- Adobe Reader 9.4
- Sun OpenSolaris Build Snv 134A
- Adobe Flash Player 10.0.0.584
- Sun OpenSolaris build snv_151
- Red Hat Enterprise Linux Server Supplementary 6
- Sun OpenSolaris Build Snv 22
- Sun OpenSolaris Build Snv 92
- Sun OpenSolaris Build Snv 19
- Red Hat Enterprise Linux Workstation Supplementary 6
- Sun OpenSolaris Build Snv 85
- Adobe Acrobat 9.1.1
- Adobe Acrobat Professional 9.3.3
- Adobe Flash Player 10.1.105.6
- Sun OpenSolaris Build Snv 64
- Sun OpenSolaris Build Snv 119
- Sun OpenSolaris Build Snv 13
- Sun OpenSolaris Build Snv 91
- Sun OpenSolaris Build Snv 137
- Sun OpenSolaris Build Snv 127
- Sun OpenSolaris Build Snv 110
- Sun OpenSolaris Build Snv 111
- Sun Solaris 10 Express
- Adobe AIR 1.5.1
- Adobe Flash Player 10.1.51.66
- Adobe AIR 2.0.4
- Sun Solaris 10 Sparc
- Adobe Flash Player 10.0.45 2
- Adobe AIR 1.5.3.9120
- Adobe AIR 1.5.3.9130
- Sun OpenSolaris Build Snv 36
- Sun OpenSolaris Build Snv 136
- Sun OpenSolaris Build Snv 54
- Sun OpenSolaris Build Snv 118
- Sun OpenSolaris Build Snv 74
- Sun OpenSolaris Build Snv 51
- Adobe Acrobat Standard 9.4
- Adobe Flash Player 10.1.95.2
- Adobe Flash Player 10.0.45 2
- Adobe Acrobat Professional 9.4
- Sun OpenSolaris Build Snv 101
- Adobe Acrobat Standard 9.3.4
- Adobe Acrobat Professional 9.3.4
- Adobe Reader 9.3.4
- Adobe Acrobat Standard 9.3.4
- Adobe Reader 9.3.4
- Sun OpenSolaris Build Snv 130
- Sun OpenSolaris Build Snv 102
- Sun OpenSolaris Build Snv 57
- Adobe Flash Player 10.2.152.33
- Adobe Flash Player 10.2.154.13
- Sun OpenSolaris Build Snv 129
- Sun OpenSolaris Build Snv 84
- Sun Solaris 10 X86
- Adobe AIR 2.0.2
- Adobe AIR 2.0.3
- Adobe Flash Player 10.1.92.10
- Adobe Acrobat 9.3.1
- Adobe Reader 9.1
- Sun OpenSolaris Build Snv 108
- Adobe Acrobat Standard 9.1
- Sun OpenSolaris Build Snv 80
- Sun OpenSolaris Build Snv 01
- Adobe Reader 9.3.3
- Sun OpenSolaris Build Snv 93
- Sun OpenSolaris Build Snv 94
- Adobe Acrobat Standard 9.3.3
- Adobe Reader 9.3.1
- Adobe Reader 9.3.2
- Sun OpenSolaris Build Snv 28
- Adobe Acrobat Professional 9.3.1
- Adobe Acrobat Standard 9.3.1
- Adobe Acrobat Professional 9 Extended
- Adobe AIR 2.0.2.12610
- Adobe Flash Player 10.1.53.64
- Adobe Reader 9.1.1
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Sun OpenSolaris Build Snv 02
- Sun OpenSolaris Build Snv 103
- Sun OpenSolaris Build Snv 95
- Sun OpenSolaris Build Snv 50
- Sun OpenSolaris Build Snv 37
- Sun OpenSolaris Build Snv 38
- Sun OpenSolaris Build Snv 87
- Sun OpenSolaris Build Snv 89
- Adobe Flash Player 10.0.42.34
- Sun OpenSolaris Build Snv 124
- Adobe AIR 1.5.2
- Sun OpenSolaris Build Snv 86
- Sun OpenSolaris Build Snv 35
- Sun OpenSolaris Build Snv 56
- Adobe Flash Player 10.0.12 .36
- Sun OpenSolaris Build Snv 117
- Sun OpenSolaris Build Snv 83
- Sun OpenSolaris Build Snv 111A
- Adobe Acrobat Professional 9.1.3
- Adobe Acrobat Standard 9.1.3
- Gentoo Linux
- Sun OpenSolaris Build Snv 109
- Sun OpenSolaris Build Snv 132
- Sun OpenSolaris Build Snv 96
- Adobe Flash Player 10.1.85.3
- Sun OpenSolaris Build Snv 90
- Sun OpenSolaris Build Snv 133
- Sun OpenSolaris Build Snv 126
- Adobe AIR 2.5.1
- Sun OpenSolaris Build Snv 81
- Sun OpenSolaris Build Snv 116
- Sun OpenSolaris Build Snv 47
- Sun OpenSolaris Build Snv 45
- Sun OpenSolaris Build Snv 82
- Sun OpenSolaris Build Snv 113
- Sun OpenSolaris Build Snv 114
- Sun OpenSolaris Build Snv 98
- Sun OpenSolaris Build Snv 131
- Sun OpenSolaris Build Snv 120
- Adobe Flash Player 10.1.102.65
- Sun OpenSolaris Build Snv 100
- Adobe Acrobat 10.0
- Adobe AIR 1.5.3
- Adobe Flash Player 10.0.15 .3
- Sun OpenSolaris Build Snv 111B
- Sun OpenSolaris Build Snv 67
- Sun OpenSolaris Build Snv 39
- Sun OpenSolaris Build Snv 68
- Sun OpenSolaris Build Snv 76
- Sun OpenSolaris Build Snv 77
- Sun OpenSolaris Build Snv 61
- Adobe Flash Player 10.2.154.18
- Adobe Flash Player 10.0.22.87
- Sun OpenSolaris Build Snv 78
- Sun OpenSolaris Build Snv 88
- Sun OpenSolaris Build Snv 59
- Adobe Flash Player 10.1.92.10
- Adobe Flash Player 10.1.95.1
- Adobe Acrobat 9.4
- Adobe Flash Player 10.0.32.18
- Sun OpenSolaris Build Snv 115
- Sun OpenSolaris Build Snv 125
- Sun OpenSolaris Build Snv 104
- Sun OpenSolaris Build Snv 105
- Adobe Acrobat Professional 9
- Adobe Flash Player 10.1.102.64
- Sun OpenSolaris Build Snv 58
- Adobe Flash Player 10.0.32 18
- Sun OpenSolaris Build Snv 29
- Sun OpenSolaris Build Snv 106
- Sun OpenSolaris Build Snv 107
- Adobe Acrobat Professional 10.0
- Adobe Acrobat Standard 10.0
- Adobe Reader 10.0
- Adobe Acrobat 9.2
HTTP:STC:ADOBE:PDF-FREETYPE - HTTP: PDF FreeType Compact Font Format Multiple Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in multiple PDF readers. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Avaya Proactive Contact 4.0
- Avaya Voice Portal 4.1
- Avaya Messaging Storage Server 1.0
- Avaya Messaging Storage Server 2.0
- Avaya Proactive Contact 3.0.2
- FreeType 2.3.5
- FreeType 2.3.6
- Avaya Messaging Storage Server 5.2
- Avaya Proactive Contact 4.2
- Sun Solaris 10 Sparc
- Ubuntu Ubuntu Linux 6.06 LTS Powerpc
- Ubuntu Ubuntu Linux 6.06 LTS I386
- Ubuntu Ubuntu Linux 6.06 LTS Amd64
- Avaya Proactive Contact 4.1.2
- Red Hat Enterprise Linux AS 3
- Sun OpenSolaris Build Snv 101A
- Red Hat Enterprise Linux ES 3
- Red Hat Enterprise Linux WS 3
- Sun OpenSolaris Build Snv 57
- Avaya Intuity AUDIX LX 1.0
- Apple iPhone 2.0.2
- Sun OpenSolaris Build Snv 28
- Mandriva Linux Mandrake 2009.1
- Mandriva Linux Mandrake 2009.1 X86 64
- Ubuntu Ubuntu Linux 8.04 LTS Amd64
- Ubuntu Ubuntu Linux 8.04 LTS I386
- Ubuntu Ubuntu Linux 8.04 LTS Lpia
- Ubuntu Ubuntu Linux 8.04 LTS Powerpc
- Ubuntu Ubuntu Linux 8.04 LTS Sparc
- Red Hat Desktop 3.0.0
- Sun OpenSolaris Build Snv 48
- Avaya Proactive Contact 3.0.3
- FreeType 2.1.10
- Avaya Aura Session Manager 6.0
- Avaya Aura System Manager 6.0 SP1
- FreeType 2.2.10
- FreeType 2.1.9
- Apple iPod Touch 2.2
- Avaya Messaging Storage Server
- Avaya Message Networking
- Sun OpenSolaris Build Snv 109
- Red Hat Desktop 4.0.0
- Sun OpenSolaris Build Snv 99
- Avaya Aura Presence Services 6.0
- Sun OpenSolaris Build Snv 49
- Avaya Aura Conferencing 6.0 Standard
- Foxit Reader 3.1.1 Build 0928
- Avaya IQ 4.1.0
- Avaya Aura Presence Services
- Avaya Aura System Manager 1.0
- Foxit Foxit Reader 2.3 Build 2923
- Ubuntu Ubuntu Linux 9.10 Amd64
- Ubuntu Ubuntu Linux 9.10 I386
- Mandriva Corporate Server 4.0.0 X86 64
- Ubuntu Ubuntu Linux 9.10 Powerpc
- Ubuntu Ubuntu Linux 9.10 Sparc
- Apple iPod Touch 3.0
- Sun OpenSolaris Build Snv 19
- Avaya Intuity AUDIX LX 2.0 SP1
- Avaya Intuity AUDIX LX 2.0 SP2
- Sun OpenSolaris Build Snv 102
- Sun Solaris 9 Sparc
- Avaya Aura Session Manager 1.1
- Avaya Proactive Contact 4.1.1
- Avaya Voice Portal 5.0 SP2
- Sun OpenSolaris Build Snv 39
- Sun OpenSolaris Build Snv 81
- Foxit Foxit Reader 3.0
- Apple iOS 4.0.1
- Avaya Aura System Platform 1.1
- Apple iPhone 2.2.1
- Apple iPhone 3.0
- Sun OpenSolaris Build Snv 77
- Ubuntu Ubuntu Linux 9.10 Lpia
- Sun OpenSolaris Build Snv 22
- Avaya Voice Portal 4.1 SP1
- Avaya Voice Portal 4.1 SP2
- Avaya Voice Portal 5.1
- Avaya Voice Portal 5.0
- Sun OpenSolaris Build Snv 85
- Avaya Messaging Storage Server 5.2 SP1
- Sun OpenSolaris Build Snv 64
- Sun OpenSolaris Build Snv 13
- Sun OpenSolaris Build Snv 91
- Sun OpenSolaris Build Snv 110
- Sun OpenSolaris Build Snv 111
- Apple iPhone 2.2
- Mandriva Linux Mandrake 2008.0
- Mandriva Linux Mandrake 2008.0 X86 64
- Sun OpenSolaris Build Snv 02
- Sun OpenSolaris Build Snv 78
- Debian Linux 5.0 Arm
- Mandriva Linux Mandrake 2010.0 X86 64
- Mandriva Linux Mandrake 2010.0
- Foxit Foxit Reader 3.0.2009.1301
- Apple iPod Touch 2.2.1
- Foxit Foxit Reader 2.3 Build 3902
- FreeType 2.0.6
- Avaya Proactive Contact 4.1
- Avaya Intuity AUDIX LX 2.0
- Avaya Intuity AUDIX LX R1.1
- Sun OpenSolaris Build Snv 36
- Sun OpenSolaris Build Snv 54
- Sun OpenSolaris Build Snv 74
- Sun OpenSolaris Build Snv 51
- Foxit Foxit Reader 3.1.4.1125
- Red Hat Fedora 12
- Avaya CMS Server 16.0
- Avaya Voice Portal 5.0 SP1
- Avaya Aura Session Manager 5.2
- Avaya Messaging Storage Server 5.0
- Avaya Aura Application Enablement Services 5.2
- Ubuntu Ubuntu Linux 9.04 Amd64
- Sun OpenSolaris Build Snv 100
- Avaya Message Networking 5.2
- Debian Linux 5.0
- Avaya Messaging Storage Server 3.1
- Avaya Message Networking 3.1
- Avaya Messaging Storage Server 3.1 SP1
- Debian Linux 5.0 Hppa
- Debian Linux 5.0 Ia-32
- SuSE SUSE Linux Enterprise 11
- Debian Linux 5.0 M68k
- Debian Linux 5.0 Mips
- Sun Solaris 10 X86
- Avaya IQ 5
- Debian Linux 5.0 S/390
- Sun OpenSolaris Build Snv 84
- Avaya CMS Server 16.1
- Sun OpenSolaris Build Snv 108
- Apple iPod Touch 2.0.1
- Foxit Foxit Reader 3.2
- Sun OpenSolaris Build Snv 80
- Avaya Aura System Manager 5.2
- Sun OpenSolaris Build Snv 01
- Sun OpenSolaris
- Sun OpenSolaris Build Snv 93
- Sun OpenSolaris Build Snv 94
- Debian Linux 5.0 Amd64
- Foxit Foxit Reader 3.0 Build 1817
- Mandriva Enterprise Server 5
- Mandriva Linux Mandrake 2009.0
- Mandriva Linux Mandrake 2009.0 X86 64
- Ubuntu Ubuntu Linux 9.04 I386
- Ubuntu Ubuntu Linux 9.04 Lpia
- Ubuntu Ubuntu Linux 9.04 Powerpc
- Ubuntu Ubuntu Linux 9.04 Sparc
- Mandriva Corporate Server 4.0
- Apple iPod Touch 2.0.2
- Apple iPod Touch 2.1
- Sun OpenSolaris Build Snv 89
- Red Hat Enterprise Linux Desktop Workstation 5 Client
- Red Hat Enterprise Linux 5 Server
- Apple iPhone 3.1
- Apple iPod Touch 3.1.1
- Sun OpenSolaris Build Snv 103
- Sun OpenSolaris Build Snv 95
- Sun OpenSolaris Build Snv 50
- Sun OpenSolaris Build Snv 37
- Avaya Aura System Platform 6.0
- Avaya Aura Application Enablement Services 5.2.1
- Sun OpenSolaris Build Snv 87
- Apple iPad 3.2
- Sun OpenSolaris Build Snv 59
- Avaya Proactive Contact
- Avaya CMS Server 15.0
- Sun OpenSolaris Build Snv 86
- Sun OpenSolaris Build Snv 35
- Sun OpenSolaris Build Snv 56
- Ubuntu Ubuntu Linux 10.04 Sparc
- Avaya Messaging Storage Server 5.1
- Apple iOS 3.2
- Apple iPhone 3.0.1
- Sun OpenSolaris Build Snv 45
- Sun OpenSolaris Build Snv 111A
- Gentoo Linux
- Sun OpenSolaris Build Snv 71
- FreeType 2.3.3
- Sun OpenSolaris Build Snv 41
- Avaya CMS Server 16.2
- Red Hat Enterprise Linux 5 Client
- Sun OpenSolaris Build Snv 96
- SuSE SUSE Linux Enterprise 10 SP3
- Sun OpenSolaris Build Snv 90
- Sun OpenSolaris Svn 126
- Avaya Messaging Storage Server 4.0
- Red Hat Fedora 13
- Avaya IR 4.0
- Sun OpenSolaris Build Snv 101
- Apple iPhone 2.1
- Apple iOS 3.2.1
- Ubuntu Ubuntu Linux 10.04 Amd64
- Ubuntu Ubuntu Linux 10.04 I386
- Ubuntu Ubuntu Linux 10.04 Powerpc
- Sun OpenSolaris Build Snv 47
- Sun OpenSolaris Build Snv 83
- Sun OpenSolaris Build Snv 82
- Debian Linux 5.0 Powerpc
- Avaya Aura Conferencing 6.0
- Avaya Messaging Storage Server MM3.0
- SuSE SUSE Linux Enterprise Server 10 SP2
- SuSE SUSE Linux Enterprise Server 9
- Sun OpenSolaris Build Snv 98
- Sun Solaris 9 X86
- Avaya Voice Portal 3.0
- Red Hat Enterprise Linux AS 4
- Red Hat Enterprise Linux ES 4
- Red Hat Enterprise Linux WS 4
- Red Hat Enterprise Linux Desktop Version 4
- Foxit Foxit Reader 2.3
- FreeType 2.0.9
- Avaya Voice Portal 4.0
- FreeType 2.4.0
- Foxit Foxit Reader 4.0
- Foxit Reader 4.1
- Foxit Reader 4.1.1
- Mandriva Linux Mandrake 2010.1 X86 64
- Mandriva Linux Mandrake 2010.1
- Avaya Message Networking MN 3.1
- SuSE openSUSE 11.1
- Apple iOS 4
- Debian Linux 5.0 Mipsel
- Apple iPhone 2.0.1
- Sun OpenSolaris Build Snv 67
- FreeType 2.3.4
- Sun OpenSolaris Build Snv 68
- Sun OpenSolaris Build Snv 76
- Foxit Foxit Reader 2.3 Build 2825
- Sun OpenSolaris Build Snv 61
- FreeType 2.1.7
- Debian Linux 5.0 Ia-64
- Apple iPad
- FreeType 2.2.1
- Ubuntu Ubuntu Linux 6.06 LTS Sparc
- Debian Linux 5.0 Sparc
- Apple iPad 3.2.1
- Sun OpenSolaris Build Snv 38
- SuSE openSUSE 11.3
- Foxit Foxit Reader 2.2
- Mandriva Enterprise Server 5 X86 64
- Sun OpenSolaris Build Snv 104
- Sun OpenSolaris Build Snv 105
- Foxit Foxit Reader 3.2.0.0303
- SuSE openSUSE 11.2
- Avaya IQ 5.1
- Apple iPhone 2.0
- Foxit Foxit Reader 3.0 Build 1506
- Apple iPod Touch 2.0
- Sun OpenSolaris Build Snv 58
- Sun OpenSolaris Build Snv 92
- Sun OpenSolaris Build Snv 88
- FreeType 2.2
- Foxit Foxit Reader 3.2.1.0401
- Sun OpenSolaris Build Snv 29
- Debian Linux 5.0 Alpha
- Apple iPhone 3.1.2
- Apple iPhone 3.1.3
- Apple iPod Touch 3.1.2
- Apple iPod Touch 3.1.3
- Sun OpenSolaris Build Snv 106
- Sun OpenSolaris Build Snv 107
- Debian Linux 5.0 Armel
- Pardus Linux 2009
- Avaya Proactive Contact 3.0
HTTP:STC:IE:MAL-JPEG1 - HTTP: Microsoft Internet Explorer Malformed JPEG File1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability in Internet Explorer. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
HTTP:STC:DL:XLS-SXDB - HTTP: Microsoft Office Excel SXDB Memory Corruption
Severity: HIGH
Description:
A memory corruption vulnerability exists in Microsoft Office Excel. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Office Excel Viewer 2003
- Microsoft Excel 2002 SP1
- Microsoft Excel 2003 SP1
- Microsoft Open XML File Format Converter for Mac
- Microsoft Excel 2002 SP3
- Microsoft Office 2008 for Mac
- Microsoft Excel 2002
- Microsoft Excel 2003 SP2
- Microsoft Excel 2003 SP3
- Microsoft Office Excel Viewer 2003 SP3
- Microsoft Office 2004 for Mac
- Microsoft Excel 2002 SP2
- Microsoft Excel 2003
HTTP:MS-WORDPERFECT-BOF - HTTP: Microsoft WordPerfect Length Field Parsing Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Microsoft WordPerfect. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- Microsoft Word 2000 SP3
- Microsoft Word 2002
- Microsoft Word 2002 SP2
- Microsoft FrontPage 2002
- Microsoft FrontPage 2000 SR1
- Microsoft FrontPage 2000 SP2
- Microsoft FrontPage 2002 SP1
- Microsoft Office XP SP3
- Microsoft Works 2000
- Microsoft Publisher 2002
- Microsoft Office 2000 SP1
- Microsoft Office 2000 SP2
- Microsoft Word 2000 SP2
- Microsoft Office XP SP1
- Microsoft Works Suite 2001
- Microsoft Works Suite 2002
- Microsoft Works Suite 2003
- Microsoft FrontPage 2000 SP1
- Microsoft Publisher 2000
- Microsoft Word 2003
- Microsoft Word 2002 SP1
- Microsoft Office XP
- Microsoft Word 2000 SR1
- Microsoft Word 2000 Sr1a
- Microsoft FrontPage 2000
- Microsoft FrontPage 2003
- Microsoft Publisher 2003
- Microsoft Word 2000
- Microsoft Office 2003
- Microsoft Works Suite 2004
- Microsoft Office 2000
- Microsoft Office 2000 SP3
- Microsoft Office XP SP2
HTTP:STC:DL:XLS-INDEX - HTTP: Microsoft Office Excel Index Parsing Code Execution
Severity: HIGH
Description:
A code execution vulnerability exists in Microsoft Office Excel products. The vulnerability is due to an improper validation of a maliciously crafted index value in an Excel document. Remote attackers can exploit this vulnerability by enticing target users to open a malicious Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In an attack scenario, where arbitrary code is injected and executed on the target machine, the behaviour of the target is dependent on the intention of the malicious code. If such an attack is not executed successfully, the vulnerable application may terminate as a result of invalid memory access.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Office Excel Viewer 2003
- Microsoft Excel 2002
- Microsoft Excel 2002 SP1
- Microsoft Excel 2003 SP1
- Microsoft Office Compatibility Pack 2007 SP2
- Microsoft Open XML File Format Converter for Mac
- Microsoft Office Compatibility Pack 2007 SP1
- Microsoft Office 2008 for Mac
- Microsoft Excel 2002 SP2
- Microsoft Excel 2002 SP3
- Microsoft Excel 2007 SP1
- Microsoft Excel Compatibility Pack
- Microsoft Excel 2003 SP3
- Microsoft Office Excel Viewer 2003 SP3
- Microsoft Excel 2003 SP2
- Microsoft Excel 2007 SP2
- Microsoft Office 2004 for Mac
- Microsoft Excel Viewer SP1
- Microsoft Excel Viewer SP2
- Microsoft Excel 2007
- Microsoft Excel 2003
HTTP:STC:DL:VISIO-FREED - HTTP: Microsoft Visio Freed Object Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Visio. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Visio 2007 SP2
- Microsoft Visio 2003 SP3
- Microsoft Visio 2003 SP2
- Microsoft Visio 2007
- Microsoft Visio 2003 Standard
- Microsoft Visio 2003 Professional
- Microsoft Visio 2003
- Microsoft Visio 2003 SP1
- Microsoft Visio 2010
- Microsoft Visio 2007 SP1
- Microsoft Visio 2010 SP1
HTTP:STC:DL:WINVERIFY-TRUST - HTTP: Microsoft Windows WinVerifyTrust Signature Validation Vulnerability
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Windows. The vulnerability is due to an error in the way WinVerifyTrust validates PE files signed with Windows Authenticode. The error allows signed PE files to be modified without impacting the signature's validation. A successful attack can allow untrusted attacker-controlled code to be copied and executed on a target machine within the context of the currently logged in user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- microsoft windows_xp - (sp2:x64)
- microsoft windows_8 - (-:x86)
- microsoft windows_server_2008 r2 (sp1:itanium)
- microsoft windows_8.1 - (-:~-~-~-~x86~)
- microsoft windows_8 - (-:x64)
- microsoft windows_rt_8.1 -
- microsoft windows_server_2012 r2 (-:~-~datacenter~~~)
- microsoft windows_xp (sp3)
- microsoft windows_server_2003 (sp2:x64)
- microsoft windows_rt -
- microsoft windows_server_2012 r2 (-:~-~standard~~~)
- microsoft windows_server_2012 -
- microsoft windows_7 (sp1:x64)
- microsoft windows_server_2008 (sp2:x64)
- microsoft windows_vista (sp2:x64)
- microsoft windows_server_2012 r2 (-:~-~essentials~~~)
- microsoft windows_server_2008 r2 (sp1:x64)
- microsoft windows_7 (sp1:x86)
- microsoft windows_server_2008 (sp2:x86)
- microsoft windows_server_2008 (sp2:itanium)
- microsoft windows_server_2003 (sp2:itanium)
- microsoft windows_8.1 - (-:~-~-~-~x64~)
Severity: MEDIUM
Description:
This signature detects malformed EMF files. EMF files are used by Microsoft for image portability between different types of devices. There is a known vulnerability in the GDI parser that handles EMF files; attackers can entice a user to open a malformed file, which can allow the attacker to take control of the user's machine as the System user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Office. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Office XP SP3
- Microsoft Office 2004 for Mac
HTTP:STC:IE:CVE-2014-1804-UAF - HTTP: Microsoft Internet Explorer CVE-2014-1804 Use-After-Free
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- microsoft internet_explorer 8
HTTP:MISC:WAPP-PARAM-SEC1 - HTTP: Multiple Web Application Parameter Tampering 1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against few web applications. A successful attack can lead to disclosure of sensitive information.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Google SketchUp. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against multiple web browsers. The issue arises when victim visits a malicious site via their browser and follows a link to a trusted site. Once the link to the trusted site is followed, the victim must open a popup window from the trusted site that can be influenced by the attacker's site. A successful exploit may allow a remote attacker to carry out phishing attacks.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Internet Explorer 5.5 SP1
- Microsoft Internet Explorer 5.0.1 SP4
- Microsoft Internet Explorer 6.0
- Microsoft Internet Explorer 5.5 SP2
- Microsoft Internet Explorer 5.0.1
- Microsoft Internet Explorer 6.0 SP1
- Microsoft Internet Explorer 5.0.1 SP1
- Microsoft Internet Explorer 7.0
- Microsoft Internet Explorer 5.0.1 For Windows 95
- Microsoft Internet Explorer 5.5 Preview
- Microsoft Internet Explorer 5.0.1 For Windows NT 4.0
- Microsoft Internet Explorer 5.0.1 For Windows 2000
- Microsoft Internet Explorer 5.0.1 SP2
- Microsoft Internet Explorer 5.5
- Microsoft Internet Explorer 5.0.1 SP3
- Microsoft Internet Explorer 5.0.1 For Windows 98
HTTP:STC:APPLE-QTIME-DREF-BO - HTTP: Apple QuickTime Alis Volume Name Parsing Stack Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the Apple QuickTime. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- apple quicktime 5.0
- apple quicktime 7.0.1
- apple quicktime 6.5.2
- apple quicktime 7.1.5
- apple quicktime 6.0
- apple quicktime 7.1.4
- apple quicktime 7.0.0
- apple quicktime 3.0
- apple quicktime 7.4.0
- apple quicktime 7.6.0
- apple quicktime 7.2.1
- apple quicktime 6.0.1
- apple quicktime 7.4.1
- apple quicktime 6.1.1
- apple quicktime 7.6.1
- apple quicktime 6.5
- apple quicktime 7.6.5
- apple quicktime 6.1.0
- apple quicktime 7.7.2
- apple quicktime 7.7.1
- apple quicktime 6.1
- apple quicktime 6.0.2
- apple quicktime 7.1.0
- apple quicktime 5.0.1
- apple quicktime 7.5.0
- apple quicktime 7.2.0
- apple quicktime 7.0.4
- apple quicktime 7.4.5
- apple quicktime 7.7.0
- apple quicktime 7.6.6
- apple quicktime 6.0.0
- apple quicktime 7.0.2
- apple quicktime 7.3.1
- apple quicktime 7.6.7
- apple quicktime 7.0.3
- apple quicktime 7.6.8
- apple quicktime 6.5.0
- apple quicktime 7.6.2
- apple quicktime 7.3.0
- apple quicktime 6.5.1
- apple quicktime 5.0.2
- apple quicktime 7.1.3
- apple quicktime 7.1.2
- apple quicktime 7.1.1
- apple quicktime 6.2.0
- apple quicktime 7.5.5
- apple quicktime 6.4.0
- apple quicktime 4.1.2
- apple quicktime 7.6.9
- apple quicktime 6.3.0
- apple quicktime up to 7.7.3
- apple quicktime 7.1.6
HTTP:STC:DL:CRYSTAL-RPT-OLE - HTTP: Microsoft Visual Studio Crystal Reports RPT File Handling Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Microsoft Visual Studio. A successful attack can lead to a arbitrary remote code execution within the context of the application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- Business Objects Crystal Reports XI Professional
- Business Objects Business Objects Enterprise XIr2
- Business Objects Crystal Reports for Visual Studio .NET 2005 10.2
- Business Objects Crystal Reports for Visual Studio .NET 2003
- Business Objects Crystal Reports for Visual Studio .NET 2002
- Microsoft Visual Studio .NET 2003 Enterprise Architect
- Microsoft Visual Studio 2005 Team Edition for Testers
- Microsoft Visual Studio 2005
- Microsoft Visual Studio .NET Professional Edition
- Microsoft Visual Studio .NET Enterprise Architect Edition
- Microsoft Visual Studio .NET Enterprise Developer Edition
- Microsoft Visual Studio .NET Academic Edition
- Microsoft Visual Studio .NET 2002 SP1
- Microsoft Visual Studio .NET 2003 SP1
- Microsoft Visual Studio 2005 Team Edition
- Business Objects Crystal Enterprise 10.0.0
- Microsoft Visual Studio .NET 2003
- Microsoft Visual Studio 2005 Standard Edition
- Microsoft Visual Studio 2005 Professional Edition
- Microsoft Visual Studio 2005 Team Edition for Developers
- Microsoft Visual Studio 2005 Team Edition for Architects
- Business Objects BusinessObjects Enterprise XI
- Microsoft Visual Studio 2005 SP1
- Microsoft Visual Studio .NET 2002
HTTP:STC:DL:XLS-VBOBJ-RCE - HTTP: Microsoft Excel VisualBasic Object Validation Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known buffer overflow vulnerability in Microsoft Excel product. It is due to improper parsing of Excel documents containing specially crafted ActiveX objects. Remote attackers can exploit this by enticing target users to open a crafted Excel file, potentially causing arbitrary code to be injected and executed in the security context of the current user. In a successful attack, the behavior of the target is dependent on the intention of the malicious code. In an unsuccessful attack, the application can terminate as a result of invalid memory access. If unexpected termination of the application is the sole result of an attack, there is no impact to the overall operation of the target host. It is, however, possible to lose all unsaved data due to the abnormal termination.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Excel 2000 SP3
- Microsoft Office Excel Viewer 2003
- Microsoft Excel 2007
- Microsoft Office Compatibility Pack 2007 SP1
- Microsoft Excel 2000
- Microsoft Office 2004 for Mac
- Microsoft Excel 2000 SP2
- Microsoft Excel 2000 SR1
- Microsoft Office Excel Viewer 2003 SP3
- Microsoft Excel 2002 SP1
- Microsoft Excel 2002 SP2
- Microsoft Excel 2007 SP1
- Microsoft Excel 2003 SP3
- Microsoft Excel 2003 SP1
- Microsoft Open XML File Format Converter for Mac
- Microsoft Office 2008 for Mac
- Microsoft Office Compatibility Pack 2007
- Microsoft Excel 2002
- Microsoft Excel 2003 SP2
- Microsoft Excel 2003
- Microsoft Excel 2002 SP3
- Microsoft Excel Viewer
HTTP:STC:DL:FREETYPE-TYPE1 - HTTP: FreeType PostScript Type1 Font Parsing Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the FreeType font engine. The vulnerability is due to improper validation of the argument count parameter passed to the PostScript operation callothersubr, which can lead to a stack buffer overflow. A remote attacker can entice a target user to download a malicious PostScript or PDF file, and leverage this vulnerability to execute arbitrary code.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Apple Mac Os X Server 10.7.1
- Ubuntu Ubuntu Linux 11.04 amd64
- Ubuntu Ubuntu Linux 11.04 ARM
- Ubuntu Ubuntu Linux 11.04 i386
- Ubuntu Ubuntu Linux 11.04 powerpc
- Apple iOS 4.0.1
- Apple iPod Touch
- Red Hat Enterprise Linux Desktop 6
- Red Hat Enterprise Linux Desktop Optional 6
- Red Hat Enterprise Linux HPC Node 6
- Red Hat Enterprise Linux HPC Node Optional 6
- Red Hat Enterprise Linux Server 6
- Red Hat Enterprise Linux Server Optional 6
- Red Hat Enterprise Linux Workstation 6
- Red Hat Enterprise Linux Workstation Optional 6
- Apple iOS 4.2.1
- Mandriva Corporate Server 4.0.0 X86 64
- SuSE SUSE Linux Enterprise Server for VMware 11 SP1
- Apple iOS 4.2
- Avaya 96x1 IP Deskphone 6
- Mandriva Enterprise Server 5 X86 64
- Mandriva Enterprise Server 5
- Mandriva Linux Mandrake 2009.0
- Mandriva Linux Mandrake 2009.0 X86 64
- Apple iOS 4.1
- FreeType 2.4.0
- Mandriva Linux Mandrake 2010.1 X86 64
- Mandriva Linux Mandrake 2010.1
- Mandriva Corporate Server 4.0
- Apple iOS 4.3
- Apple iOS 4.0.2
- Apple iPad
- Apple iOS 3.2.1
- Apple iOS 3.2
- Apple iOS 4
- Apple iPhone
- FreeType 2.4.3
- Ubuntu Ubuntu Linux 10.10 amd64
- Debian Linux 6.0 amd64
- Debian Linux 6.0 arm
- Red Hat Fedora 15
- Debian Linux 6.0 sparc
- Debian Linux 6.0 ia-64
- Debian Linux 6.0 mips
- Debian Linux 6.0 powerpc
- Debian Linux 6.0 s/390
- Apple iPad
- Apple iOS 3.2.2
- SuSE SUSE Linux Enterprise Desktop 11 SP1
- Apple iOS 4.2 beta
- SuSE SUSE Linux Enterprise Server 11 SP1
- SuSE openSUSE 11.3
- Ubuntu Ubuntu Linux 10.10 i386
- Gentoo Linux
- Apple Mac Os X 10.7
- Apple Mobile Safari
- Ubuntu Ubuntu Linux 10.10 ARM
- FreeType 2.4.2
- SuSE SUSE Linux Enterprise SDK 11 SP1
- FreeType 2.4.5
- Debian Linux 6.0 ia-32
- Apple iOS 4.3.3
- Apple iOS 3.1
- SuSE openSUSE 11.4
- Ubuntu Ubuntu Linux 10.10 powerpc
- Apple iOS 4.3.2
- Apple iOS 4.2.5
- Apple iOS 4.2.6
- Apple iOS 4.2.7
- Apple iOS 4.3.1
- Apple iOS 3.0
- Apple iOS 4.2.8
- Apple Mac Os X 10.7.1
- Apple Mac Os X Server 10.7
HTTP:STC:JAVA:JMXMBEAN-RCE - HTTP: Oracle Java JmxMBeanServer Package Sandbox Breach
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Oracle Java. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- oracle jdk 1.7.0 (update4)
- oracle jre 1.7.0 (update5)
- oracle jdk 1.7.0 (update3)
- oracle jre 1.7.0 (update9)
- oracle jre 1.7.0 (update3)
- oracle jdk 1.7.0 (update9)
- oracle jre 1.7.0 (update7)
- oracle jre 1.7.0 (update10)
- oracle jre 1.7.0 (update1)
- oracle jdk 1.7.0 (update2)
- oracle jdk 1.7.0 (update7)
- oracle jdk 1.7.0 (update10)
- oracle jdk 1.7.0 (update1)
- oracle jre 1.7.0 (update2)
- oracle jre 1.7.0 (update6)
- oracle jdk 1.7.0 (update6)
- oracle jre 1.7.0 (update4)
- oracle jdk 1.7.0 (update5)
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Windows Portable Executable (PE) file format. A successful attack can lead to remote code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- Microsoft Windows XP Professional
- Microsoft Windows XP Home
- Microsoft Windows 7 for 32-bit Systems SP1
- Microsoft Windows 7 for x64-based Systems SP1
- Microsoft Windows 7 for 32-bit Systems
- Microsoft Windows Vista SP1
- Microsoft Windows Server 2008 for x64-based Systems R2
- Microsoft Windows 7 for x64-based Systems
- Microsoft Windows Vista
- Microsoft Windows Vista SP2
- Avaya CallPilot 4.0
- Avaya CallPilot 5.0
- Microsoft Windows Vista x64 Edition SP2
- Avaya Communication Server 1000 Telephony Manager 4.0
- Avaya Messaging Application Server 5.2
- Microsoft Windows Server 2008 for 32-bit Systems SP2
- Microsoft Windows Server 2008 for Itanium-based Systems SP2
- Microsoft Windows Server 2008 for x64-based Systems SP2
- Microsoft Windows Server 2008 R2 Itanium SP1
- Microsoft Windows Server 2008 R2 for x64-based Systems SP1
- Avaya Meeting Exchange 5.0 SP2
- Avaya Meeting Exchange 5.1 SP1
- Avaya Meeting Exchange 5.0
- Microsoft Windows XP Professional SP2
- Microsoft Windows Vista x64 Edition SP1
- Microsoft Windows XP Home SP1
- Avaya Meeting Exchange - Client Registration Server
- Avaya Meeting Exchange 5.0.0.0.52
- Avaya Meeting Exchange - Streaming Server
- Avaya Meeting Exchange - Web Conferencing Server
- Avaya Meeting Exchange - Webportal
- Microsoft Windows XP
- Avaya Messaging Application Server 5
- Microsoft Windows XP Service Pack 3
- Microsoft Windows Server 2003 Enterprise x64 Edition
- Microsoft Windows XP Professional SP1
- Microsoft Windows Server 2003 SP1
- Microsoft Windows Server 2003 SP2
- Microsoft Windows XP Professional SP3
- Microsoft Windows XP Home SP3
- Avaya Meeting Exchange 5.0 SP1
- Microsoft Windows Server 2003 Enterprise Edition Itanium SP1
- Avaya Meeting Exchange - Recording Server
- Microsoft Windows XP Professional x64 Edition
- Microsoft Windows Server 2003 Enterprise x64 Edition SP2
- Avaya Aura Conferencing 6.0 Standard
- Microsoft Windows Server 2003 Enterprise Edition Itanium SP2
- Microsoft Windows Vista x64 Edition
- Microsoft Windows Server 2003 Enterprise Edition Itanium
- Microsoft Windows XP Professional x64 Edition SP2
- Avaya Meeting Exchange 5.2
- Microsoft Windows Server 2008 R2 Itanium
- Microsoft Windows Server 2008 for 32-bit Systems
- Microsoft Windows Server 2008 for x64-based Systems
- Avaya Meeting Exchange 5.1
- Microsoft Windows Server 2008 for Itanium-based Systems
- Avaya Communication Server 1000 Telephony Manager 3.0
- Microsoft Windows XP Home SP2
- Avaya Meeting Exchange 5.2 SP2
- Microsoft Windows Server 2003 Enterprise Edition Itanium SP1 Beta 1
- Avaya Meeting Exchange 5.2 SP1
HTTP:STC:DL:XLS-FNGROUPNAME - HTTP: Microsoft Office Excel FNGROUPNAME Record Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known memory corruption vulnerability in Microsoft Office Excel. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Excel 2007 SP1
- Microsoft Excel 2007 SP2
- Microsoft Excel 2003 SP3
- Microsoft Excel 2007
- Microsoft Excel 2004 for Mac
HTTP:STC:DL:XORG-PCF-BO - HTTP: X.Org X Server PCF Font Parser Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the X.Org X Server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server's process.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- X.org xorg-server 1.02-R5
- SuSE Novell Linux POS 9
- SuSE Linux Personal 10.1
- SuSE Linux Professional 10.1
- Mandriva Linux Mandrake 2007.0 X86 64
- Sun Solaris 10 Sparc
- Red Hat Enterprise Linux Desktop 5 Client
- Red Hat Enterprise Linux Virtualization 5 Server
- Ubuntu Ubuntu Linux 6.06 LTS Powerpc
- Ubuntu Ubuntu Linux 6.06 LTS I386
- Ubuntu Ubuntu Linux 6.06 LTS Amd64
- Avaya CMS Server 13.0.0
- Red Hat Enterprise Linux AS 3
- Red Hat Enterprise Linux ES 3
- Red Hat Enterprise Linux WS 3
- Apple Mac OS X 10.5.2
- Apple Mac OS X Server 10.5.2
- Red Hat Desktop 3.0.0
- NoMachine NX Server 3.1.0
- NoMachine nx-X11 3.1.0-3
- Ubuntu Ubuntu Linux 6.10 Amd64
- Ubuntu Ubuntu Linux 6.10 I386
- Ubuntu Ubuntu Linux 6.10 Powerpc
- Ubuntu Ubuntu Linux 6.10 Sparc
- SuSE openSUSE 10.3
- SuSE Linux 10.1 X86
- SuSE Linux 10.1 X86-64
- SuSE Linux 10.1 Ppc
- Red Hat Desktop 4.0.0
- SuSE SUSE Linux Enterprise Server 8
- HP HP-UX B.11.31
- Attachmate Reflection for IBM 14
- rPath Appliance Platform Linux Service 1
- Red Hat Enterprise Linux WS 2.1 IA64
- Red Hat Enterprise Linux AS 2.1 IA64
- Red Hat Enterprise Linux ES 2.1 IA64
- X.org X11R7 1.1.1
- Avaya CMS Server 12.0.0
- Avaya Interactive Response 2.0
- SuSE Open-Enterprise-Server
- HP HP-UX B.11.23
- Mandriva Corporate Server 4.0.0 X86 64
- X.org Xserver 1.3.0
- Avaya CMS Server 14.0
- Linux Terminal Server Project 4.2
- Mandriva Linux Mandrake 2008.0
- Mandriva Linux Mandrake 2008.0 X86 64
- Red Hat Fedora 7
- Ubuntu Ubuntu Linux 7.10 I386
- Ubuntu Ubuntu Linux 7.10 Powerpc
- Ubuntu Ubuntu Linux 7.10 Sparc
- Gentoo Linux
- Red Hat Enterprise Linux AS 2.1
- Red Hat Enterprise Linux ES 2.1
- Red Hat Enterprise Linux WS 2.1
- X.org xorg-server 1.3.99.2 (RC2)
- X.org xorg-server 1.4
- IBM AIX 6.1
- Mandriva Linux Mandrake 2007.1
- Mandriva Linux Mandrake 2007.1 X86 64
- Attachmate Reflection for IBM 14.0.5
- X.org X11R6 4.0
- X.org X11R6 5.1
- Sun Solaris 9 Sparc
- IBM AIX 5.2
- Attachmate Reflection X 14.0.5
- Attachmate Reflection for HP 14.0.5
- Red Hat Advanced Workstation for the Itanium Processor 2.1.0 IA64
- X.org X11R6 6.8.2
- Sun Solaris 10 X86
- SuSE SUSE Linux Enterprise SDK 9
- Apple Mac OS X Server 10.4.11
- rPath rPath Linux 1
- Sun Solaris 8 Sparc
- Avaya Interactive Response 3.0
- Sun Solaris 8 X86
- IBM AIX 5.3
- X.org X11R7 1.0.0
- X.org X11R7 1.0.1
- Mandriva Corporate Server 4.0
- Mandriva Linux Mandrake 2007.0
- Red Hat Enterprise Linux Desktop Workstation 5 Client
- Red Hat Enterprise Linux 5 Server
- X.org X11R7 7.0
- X.org X11R7 7.1
- Ubuntu Ubuntu Linux 7.04 Amd64
- Ubuntu Ubuntu Linux 7.04 I386
- Ubuntu Ubuntu Linux 7.04 Powerpc
- Ubuntu Ubuntu Linux 7.04 Sparc
- Mandriva Corporate Server 3.0.0
- HP HP-UX B.11.23
- Red Hat Fedora 8
- X.org X11R6 6.7.0 .0
- X.org X11R7 7.2
- SuSE openSUSE 10.2
- X.org xorg-server 1.2
- X.org LibXfont 1.3.1
- X.org X11R6 6.8.0
- X.org X11R6 6.8.1
- Ubuntu Ubuntu Linux 7.10 Amd64
- Debian Linux 4.0 Alpha
- Debian Linux 4.0 Amd64
- Debian Linux 4.0 Arm
- Debian Linux 4.0 Hppa
- Debian Linux 4.0 Ia-32
- Debian Linux 4.0 Ia-64
- Debian Linux 4.0 M68k
- Debian Linux 4.0 Mips
- Debian Linux 4.0 Mipsel
- Debian Linux 4.0 Powerpc
- Debian Linux 4.0 S/390
- Debian Linux 4.0 Sparc
- Red Hat Advanced Workstation for the Itanium Processor 2.1.0
- Avaya CMS Server 13.1
- X.org X11R6 6.9.0
- Attachmate Reflection X 14.0
- Attachmate Reflection X 13.0
- X.org X11R7 1.0.2
- Apple Mac OS X 10.4.11
- SuSE SUSE Linux Enterprise Server 10
- Attachmate Reflection for UNIX and OpenVMS 14.0.5
- Sun Solaris 9 X86
- Red Hat Enterprise Linux AS 4
- Red Hat Enterprise Linux ES 4
- Red Hat Enterprise Linux WS 4
- HP HP-UX B.11.11
- Attachmate Reflection 13.0
- Attachmate Reflection 13.0.4
- Attachmate Reflection 13.0.5
- Attachmate Reflection 14.0
- Attachmate Reflection 14.0 SP1
- Ubuntu Ubuntu Linux 6.06 LTS Sparc
- SuSE SUSE Linux Enterprise SDK 10.SP1
- SuSE SUSE Linux Enterprise Server 10 SP1
- Mandriva Corporate Server 3.0.0 X86 64
- OpenBSD 4.1
- X.org xorg-server 1.0.2-R6
- HP HP-UX B.11.11
- HP HP-UX B.11.23
- HP HP-UX B.11.31
- OpenBSD 4.2
APP:CA:ARCSRV:GWT-INFO-DISC - APP: CA ARCserve D2D GWT RPC Request Credentials Disclosure
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known vulnerability against CA ARCserve D2D. A successful attack can result in credentials disclosure and thereafter arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- Computer Associates ARCserve Backup for Windows D2D Option Basic Edition r15
- Computer Associates ARCserve D2D for Windows Server Standard Edition r15
- Computer Associates ARCServe D2D r15
HTTP:STC:DL:IRFANVIEW-MC - HTTP: IrfanView FlashPix Plug-in Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against IrfanView. A successful attack can lead to a arbitrary remote code execution within the context of the affected application.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
APP:CAIN-ABEL-CISCO-IOS-BOF - APP: Cain & Abel Cisco IOS Configuration File Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Cain & Abel Cisco IOS. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- adobe flash_player 11.2.202.261
- adobe flash_player 11.2.202.233
- adobe flash_player 11.2.202.262
- adobe flash_player 11.2.202.359
- adobe flash_player 11.2.202.332
- adobe adobe_air 13.0.0.83
- adobe flash_player 11.2.202.297
- adobe flash_player 11.2.202.346
- adobe flash_player 13.0.0.206
- adobe flash_player 13.0.0.182
- adobe flash_player 11.2.202.251
- adobe flash_player 11.2.202.341
- adobe flash_player 11.2.202.236
- adobe flash_player 11.2.202.310
- adobe flash_player 11.2.202.235
- adobe flash_player 13.0.0.201
- adobe flash_player 11.2.202.228
- adobe flash_player 11.2.202.280
- adobe flash_player 11.2.202.350
- adobe flash_player 11.2.202.335
- adobe adobe_air_sdk 13.0.0.83
- adobe adobe_air_sdk 13.0.0.111
- adobe flash_player 11.2.202.275
- adobe flash_player 11.2.202.238
- adobe flash_player 11.2.202.285
- adobe flash_player 11.2.202.273
- adobe flash_player 11.2.202.258
- adobe flash_player 13.0.0.214
- adobe flash_player 11.2.202.291
- adobe flash_player 11.2.202.356
- adobe flash_player 11.2.202.243
- adobe adobe_air 13.0.0.111
- adobe flash_player 11.2.202.270
- adobe flash_player 11.2.202.336
- adobe flash_player 11.2.202.223
HTTP:STC:DL:MS-CRFTD-RTF-DOC-MC - HTTP: Microsoft Office Crafted RTF Document Handling Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Office Docx file. A successful attack can lead to denial of service or arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
HTTP:STC:DL:MS-MEDIA-DVR - HTTP: Microsoft Windows Media DVR-MS File Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Windows Media Player and Windows Media Center. A successful attack can lead to memory corruption and arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- Microsoft Windows 7 for 32-bit Systems SP1
- Microsoft Windows 7 for x64-based Systems SP1
- Microsoft Windows XP Professional x64 Edition SP2
- Microsoft Windows Vista SP2
- Microsoft Windows Vista x64 Edition SP2
- Microsoft Windows XP Service Pack 3
- Microsoft Windows XP Media Center Edition 2005 SP3
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Flash Player. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in the php_quot_print_encode() function in PHP. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- php 5.0.4
- php 3.0.1
- php 5.4.4
- php 4.4.6
- php 1.0
- php 5.3.9
- php 3.0.3
- php 5.1.4
- php up to 5.3.25
- php 4.3.2
- php 5.3.21
- php 3.0.5
- php 4.3.4
- php 5.3.23
- php 5.3.12
- php 4.0 (beta4)
- php 3.0.7
- php 5.1.6
- php 4.4.8
- php 5.2.5
- php 5.4.11
- php 5.2.7
- php 5.1.0
- php 5.2.12
- php 4.3.11
- php 5.2.1
- php 5.3.15
- php 4.3.0
- php 2.0
- php 4.4.5
- php 5.2.10
- php 5.2.3
- php 4.0.6
- php 5.2.16
- php 5.3.18
- php 4.0.4
- php 5.3.1
- php 5.2.14
- php 5.1.3
- php 5.0.3
- php 4.0.2
- php 5.3.3
- php 4.0.0
- php 5.2.9
- php 5.3.5
- php 5.3.7
- php 5.3.10
- php 5.4.10
- php 4.2.0
- php 5.0.5
- php 5.4.9
- php 5.4.12
- php 4.2.2
- php 5.3.14
- php 3.0.8
- php 5.4.14
- php 5.3.13
- php 5.3.16
- php 5.0.0 (rc1)
- php 5.0.1
- php 5.0.0 (beta4)
- php 4.3.9
- php 3.0.15
- php 5.4.3
- php 4.4.3
- php 3.0.13
- php 5.4.1
- php 5.1.1
- php 3.0.17
- php 5.0.0 (beta1)
- php 3.0.11
- php 5.4.7
- php 4.4.7
- php 3.0.2
- php 5.0.0 (rc3)
- php 5.2.4
- php 5.4.5
- php 5.1.5
- php 4.0 (beta3)
- php 5.2.8
- php 5.1.2
- php 4.0 (beta2)
- php 4.3.1
- php 5.3.20
- php 3.0.4
- php 4.0 (beta_4_patch1)
- php 4.3.3
- php 5.3.22
- php 3.0.6
- php 4.4.9
- php 5.4.2
- php 5.0.0 (beta2)
- php 4.3.5
- php 5.3.24
- php 5.2.6
- php 4.3.7
- php 4.3.10
- php 5.2.0
- php 4.3.6
- php 5.2.13
- php 5.2.2
- php 2.0b10
- php 4.0.7
- php 5.2.11
- php 5.3.19
- php 4.0.5
- php 3.0
- php 5.2.17
- php 4.0.3
- php 5.3.0
- php 5.2.15
- php 5.4.0
- php 4.0.1
- php 5.3.2
- php 5.3.4
- php 5.3.11
- php 5.3.6
- php 4.2.1
- php 4.1.1
- php 4.4.1
- php 5.4.8
- php 5.3.8
- php 4.2.3
- php 5.0.2
- php 5.0.0 (beta3)
- php 3.0.18
- php 5.4.13
- php 5.3.17
- php 3.0.9
- php 3.0.16
- php 5.4.15
- php 4.3.8
- php 3.0.14
- php 4.1.2
- php 4.4.4
- php 3.0.12
- php 4.1.0
- php 4.4.2
- php 5.0.0 (rc2)
- php 4.0 (beta1)
- php 3.0.10
- php 5.4.6
- php 4.4.0
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Adobe Photoshop CS5. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, mx-11.4, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, idp-5.0.110130325, isg-3.1.135801, isg-3.4.0, isg-3.5.0, idp-4.0.110090831, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.0.110090709, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, isg-3.4.139899, isg-3.1.134269, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Adobe Photoshop CS5
- Adobe Photoshop CS5.1
APP:CUPS:GIF-READ-LZW-OF - APP: Apple CUPS gif_read_lzw Heap Buffer Overflow
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability in Common Unix Printing System (CUPS). A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- Ubuntu Ubuntu Linux 11.04 amd64
- Ubuntu Ubuntu Linux 11.04 ARM
- Ubuntu Ubuntu Linux 11.04 i386
- Ubuntu Ubuntu Linux 11.04 powerpc
- Ubuntu Ubuntu Linux 10.04 Amd64
- Ubuntu Ubuntu Linux 10.04 I386
- Ubuntu Ubuntu Linux 10.04 Powerpc
- Ubuntu Ubuntu Linux 10.04 Sparc
- Ubuntu Ubuntu Linux 10.04 ARM
- Ubuntu Ubuntu Linux 10.10 ARM
- Mandriva Enterprise Server 5 X86 64
- Mandriva Enterprise Server 5
- Mandriva Linux Mandrake 2009.0
- Mandriva Linux Mandrake 2009.0 X86 64
- Mandriva Linux Mandrake 2010.1 X86 64
- Mandriva Linux Mandrake 2010.1
- Ubuntu Ubuntu Linux 8.04 LTS Amd64
- Ubuntu Ubuntu Linux 8.04 LTS I386
- Ubuntu Ubuntu Linux 8.04 LTS Lpia
- Mandriva Linux Mandrake 2011
- Mandriva Linux Mandrake 2011 x86_64
- Ubuntu Ubuntu Linux 10.10 amd64
- Debian Linux 6.0 amd64
- Debian Linux 6.0 arm
- Debian Linux 6.0 powerpc
- Debian Linux 6.0 sparc
- Debian Linux 6.0 ia-64
- Debian Linux 6.0 mips
- Debian Linux 6.0 s/390
- Ubuntu Ubuntu Linux 8.04 LTS Powerpc
- Ubuntu Ubuntu Linux 8.04 LTS Sparc
- Ubuntu Ubuntu Linux 10.10 i386
- Gentoo Linux
- Debian Linux 6.0 ia-32
- Ubuntu Ubuntu Linux 10.10 powerpc
- Easy Software Products CUPS 1.4.8
HTTP:STC:DL:DOT-NET-WEB-PROXY - HTTP: Microsoft .NET Web Proxy Auto Discovery Vulnerability
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft .NET Web Proxy. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603
References:
Affected Products:
- microsoft .net_framework 4.0
- microsoft .net_framework 2.0 (sp2)
- microsoft .net_framework 4.5
- microsoft .net_framework 3.5.1
- microsoft .net_framework 3.5
HTTP:STC:DL:RTF-MISMATCH - HTTP: Microsoft Word RTF Mismatch Remote Code Execution
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Word. A successful attack can lead to arbitrary code execution.
Supported On:
srx-branch-11.4, idp-4.1.110110719, idp-4.0.0, idp-4.0.110090709, isg-3.4.140032, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, isg-3.4.139899, srx-branch-9.4, idp-5.0.110121210, srx-12.1, srx-branch-12.1, idp-4.2.110100823, idp-5.0.110130325, srx-branch-10.0, mx-11.4, srx-10.0, isg-3.5.141455, idp-4.2.110101203, idp-4.0.110090831, idp-5.1.0, j-series-9.5, srx-9.2, vsrx-15.1, idp-4.1.110110609, idp-5.1.110160603, vsrx-12.1, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
Affected Products:
- Microsoft Office Compatibility Pack SP2
- Microsoft Word 2007 SP2
- Microsoft Word 2007 SP1
- Microsoft Office 2008 for Mac
- Microsoft Office Compatibility Pack SP3
- Microsoft Word 2007
- Microsoft Word 2003 SP1
- Microsoft Word 2003 SP2
- Microsoft Office 2011 for Mac
- Microsoft Word 2003 SP3
- Microsoft Word 2007 SP3
HTTP:STC:MS-WORD-INDEX-MC - HTTP: Microsoft Office Bad Index Memory Corruption
Severity: HIGH
Description:
This signature detects attempts to exploit a known vulnerability against Microsoft Word. A successful attack can lead to memory corruption or arbitrary code execution.
Supported On:
srx-branch-11.4, mx-11.4, idp-4.1.0, mx-9.4, srx-9.2, srx-branch-9.4, j-series-9.5, srx-12.1, srx-branch-12.1, srx-10.0, srx-branch-10.0, vsrx-12.1, vsrx-15.1, idp-5.1.110160603, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, srx-11.4
References:
HTTP:STC:DL:MS-OFFICE-PICT-MC1 - HTTP: Microsoft Office PICT Filter Map Structure Memory Corruption1
Severity: MEDIUM
Description:
This signature detects attempts to exploit a known flaw in Microsoft Office PICT Filter. A successful attack can lead to arbitrary code execution.
Supported On:
idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141455, idp-5.1.110151117, isg-3.5.141597, idp-5.1.110160603