CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
96.8%
A vulnerability in HP OpenView Storage Data Protector may allow an attacker to issue arbitrary commands on an affected system.
HP Openview
HP Openview is a range of products, distributed and developed by Hewlett Packard, that are used for enterprise system and network monitoring.
HP OpenView Storage Data Protector
HP OpenView Storage Data Protector manages backup and recovery processes across local networks and storage area networks (SAN). The software uses a proprietary protocol for communications between the central backup server (Cell Manager) and clients (Agents).
The problem
On HP OpenView Storage Data Protector 5.1 and 5.5, it may be possible for an attacker to create a specially crafted packet that will pass commands to the backup agents with no authentication or input validation.
An remote, unauthenticated attacker may be able execute arbitrary commands on the backup agents with system privileges.
Apply a patch from the vendor
HP has released patches to address this issue. Please see the systems affected section of this document for more information.
Restrict access
Restricting network access to the backup agents may mitigate this vulnerability. The Administrator’s Guide provides instructions on configuring the HP OpenView Storage Data Protector software.
673228
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: August 23, 2006
Affected
Patches are available. Please refer to the following Security Bulletin for details.
Document ID: c00742778
HPSBMA02138 SSRT061184 rev.1 - HP OpenView Storage Data Protector, Remote Arbitrary Command Execution
The vendor has not provided us with any further information regarding this vulnerability.
See HP Security Bulletin c00742778 for more details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23673228 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was originally reported by NISCC.
This document was written by Ryan Giobbi.
CVE IDs: | CVE-2006-4201 |
---|---|
Severity Metric: | 0.94 Date Public: |
h20000.www2.hp.com/bc/docs/support/SupportManual/c00663793/c00663793.pdf
h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00742778&jumpid=reg_R1002_USEN
itrc.hp.com/service/cki/docDisplay.do?docId=c00742778
secunia.com/advisories/21485/
www.uniras.gov.uk/niscc/docs/re-20060811-00547.pdf?lang=en