The client in HP Data Protector does not properly validate EXEC_CMD arguments, which allows remote attackers to execute arbitrary Perl code via a crafted command, related to the “local bin directory.”
dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-hp
marc.info/?l=bugtraq&m=130391284726795&w=2
securityreason.com/securityalert/8261
securityreason.com/securityalert/8323
securityreason.com/securityalert/8329
www.securityfocus.com/bid/46234
www.vupen.com/english/advisories/2011/0308
zerodayinitiative.com/advisories/ZDI-11-055/