Vulnerability CVE-2011-0923


Published: 2011-02-08   Modified: 2012-02-13

Description:
The client in HP Data Protector does not properly validate EXEC_CMD arguments, which allows remote attackers to execute arbitrary Perl code via a crafted command, related to the "local bin directory."

See advisories in our WLB2 database:
Topic
Author
Date
High
HP Data Protector Client EXEC_CMD Remote Code Execution PoC (ZDI-11-055)
fdisk
30.05.2011
High
HP Data Protector Remote Shell for HPUX
Adrian Puente Z.
06.08.2011
High
HP Data Protector Remote Shell for HP-UX
Adrian Puente Z.
08.08.2011
High
HP Data Protector 6.1 EXEC_CMD Remote Code Execution
metasploit
25.02.2012

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
HP -> Data protector 

 References:
http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-hp
http://marc.info/?l=bugtraq&m=130391284726795&w=2
http://securityreason.com/securityalert/8261
http://securityreason.com/securityalert/8323
http://securityreason.com/securityalert/8329
http://www.securityfocus.com/bid/46234
http://www.vupen.com/english/advisories/2011/0308
http://zerodayinitiative.com/advisories/ZDI-11-055/

Copyright 2022, cxsecurity.com

 

Back to Top