'; } else{ echo ''; } echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "update1.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "update1.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "update1.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "update1.hp-telecom.com") { echo ''; echo 'hp-telecom'; } elseif ($_SERVER[HTTP_HOST] == "update1.maipu.com") { echo ''; echo 'Maipu'; } elseif ($_SERVER[HTTP_HOST] == "update1.ncurity.com") { echo ''; echo 'Ncurity'; } elseif ($_SERVER[HTTP_HOST] == "update1.socusnetwork.com") { echo ''; echo 'Socusnetwork'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

RULE(RULE ID:332829)

Rule General Information
Release Date: 2021-03-26
Rule Name: Microsoft Office MSODataSourceControl ActiveX Control Denial of Service Vulnerability (CVE-2007-3282)
Severity:
CVE ID:
Rule Protection Details
Description: A Null dereference vulnerability exists in certain versions of Microsoft Office. The vulnerability is due to insufficient data validation when processing user-supplied data. Remote attackers can exploit this vulnerability by persuading target users to visit a specially crafted web page. Successful exploitation may create a denial of service condition to the affected process. In a attack case, the affected Internet Explorer may terminate when the malicious page is opened and cause denial of service.
Impact: An attacker can launch a denial of service attack by exploiting the vulnerability successfully.
Affected OS: Windows
Reference: http://xforce.iss.net/xforce/xfdb/34849
http://www.securitytracker.com/id
http://www.milw0rm.com/exploits/4067
OSVDB:38471
Solutions
Refer to the announcement or patch by the vendor: http://windows.microsoft.com