TippingPoint Zero Day Initiative

(0day) Hewlett-Packard Data Protector Client EXEC_CMD omni_chk_ds.sh Remote Code Execution Vulnerability

ZDI-11-054: February 7th, 2011


CVSS Score

Affected Vendors

Affected Products

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 6798. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows an attacker to execute remote code on vulnerable installations of the Hewlett-Packard Data Protector client. User interaction is not required to exploit this vulnerability.

The specific flaw exists within the filtering of the EXEC_CMD command. The Data Protector client only verifies file names, not their contents. By supplying malicious code within specific script files, arbitrary code execution is possible under the context of the current user.

Vendor Response

Hewlett-Packard states:

Disclosure Timeline

    2009-01-26 - Vulnerability reported to vendor
    2011-02-07 - Coordinated public release of advisory


This vulnerability was discovered by: