Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

APP:HP-DATA-PRTCTR-EXEC_CMD-RCE

Severity

Critical

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

HP Data Protector Client EXEC_CMD Command Execution

Release Date

2011/06/15

Update Number

1939

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

APP: HP Data Protector Client EXEC_CMD Command Execution


This signature detects attempts to exploit a known vulnerability in HP Data Protector Client. Attackers can send a maliciously crafted message that could cause arbitrary commands to be executed with SYSTEM privileges.

Extended Description

HP OpenView Storage Data Protector is prone to multiple remote code-execution vulnerabilities that affect the Cell Manager and Client components. An attacker can exploit these issues to execute arbitrary code with SYSTEM-level privileges. Successful exploits will completely compromise an affected computer.

Affected Products

  • Hp data_protector_manager 6.11
  • Hp data_protector_manager A.06.11
  • Hp openview_storage_data_protector 5.1
  • Hp openview_storage_data_protector 5.5
  • Hp openview_storage_data_protector 5.5.0
  • Hp openview_storage_data_protector 6.0
  • Hp openview_storage_data_protector 6.1
  • Hp openview_storage_data_protector 6.10
  • Hp openview_storage_data_protector 6.11

References

  • BugTraq: 46234
  • CVE: CVE-2011-0923
  • URL: http://hackarandas.com/blog/2011/08/04/hp-data-protector-remote-shell-for-hpux
  • URL: https://community.rapid7.com/thread/2253

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out