Lucene search

K
zdiAnonymousZDI-11-055
HistoryFeb 07, 2011 - 12:00 a.m.

(0Day) Hewlett-Packard Data Protector Client EXEC_CMD Perl Remote Code Execution Vulnerability

2011-02-0700:00:00
Anonymous
www.zerodayinitiative.com
18

0.973 High

EPSS

Percentile

99.9%

This vulnerability allows an attacker to execute remote code on vulnerable installations of the Hewlett-Packard Data Protector client. User interaction is not required to exploit this vulnerability. The specific flaw exists within the filtering of arguments to the EXEC_CMD command. The Data Protector client allows remote connections to execute files within it’s local bin directory. By supplying maliciously crafted input to the EXEC_CMD a remote attacker can interact with a Perl interpreter and execute arbitrary code under the context of the current user.