Vulnerability Description
The client in HP Data Protector does not properly validate EXEC_CMD arguments, which allows remote attackers to execute arbitrary Perl code via a crafted command, related to the "local bin directory."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hp | Data Protector | All versions |
Related Weaknesses (CWE)
References
- http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-hp
- http://marc.info/?l=bugtraq&m=130391284726795&w=2
- http://securityreason.com/securityalert/8261
- http://securityreason.com/securityalert/8323
- http://securityreason.com/securityalert/8329
- http://www.securityfocus.com/bid/46234
- http://www.vupen.com/english/advisories/2011/0308Vendor Advisory
- http://zerodayinitiative.com/advisories/ZDI-11-055/
- http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-hp
- http://marc.info/?l=bugtraq&m=130391284726795&w=2
- http://securityreason.com/securityalert/8261
- http://securityreason.com/securityalert/8323
- http://securityreason.com/securityalert/8329
- http://www.securityfocus.com/bid/46234
- http://www.vupen.com/english/advisories/2011/0308Vendor Advisory
FAQ
What is CVE-2011-0923?
CVE-2011-0923 is a vulnerability with a CVSS score of 10.0 (HIGH). The client in HP Data Protector does not properly validate EXEC_CMD arguments, which allows remote attackers to execute arbitrary Perl code via a crafted command, related to the "local bin directory."
How severe is CVE-2011-0923?
CVE-2011-0923 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-0923?
Check the references section above for vendor advisories and patch information. Affected products include: Hp Data Protector.