(0day) Hewlett-Packard Data Protector Client EXEC_CMD Perl Remote Code Execution VulnerabilityZDI-11-055: February 7th, 2011
TippingPoint™ IPS Customer ProtectionTippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 8063. For further product information on the TippingPoint IPS:
This vulnerability allows an attacker to execute remote code on vulnerable installations of the Hewlett-Packard Data Protector client. User interaction is not required to exploit this vulnerability.
The specific flaw exists within the filtering of arguments to the EXEC_CMD command. The Data Protector client allows remote connections to execute files within it's local bin directory. By supplying maliciously crafted input to the EXEC_CMD a remote attacker can interact with a Perl interpreter and execute arbitrary code under the context of the current user.
Vendor ResponseHewlett-Packard states:
2009-01-26 - Vulnerability reported to vendor
2011-02-07 - Coordinated public release of advisory
CreditThis vulnerability was discovered by: