TippingPoint Zero Day Initiative

(0day) Hewlett-Packard Data Protector Client EXEC_SETUP Remote Code Execution Vulnerability

ZDI-11-056: February 7th, 2011


CVSS Score

Affected Vendors

Affected Products

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 8050. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows an attacker to execute remote code on vulnerable installations of the Hewlett-Packard Data Protector client. User interaction is not required to exploit this vulnerability.

The specific flaw exists within the implementation of the EXEC_SETUP command. This command instructs a Data Protector client to download and execute a setup file. A malicious attacker can instruct the client to access a file off of a share thus executing arbitrary code under the context of the current user.

Vendor Response

Hewlett-Packard states:

Disclosure Timeline

    2009-01-26 - Vulnerability reported to vendor
    2011-02-07 - Coordinated public release of advisory


This vulnerability was discovered by: