The client in HP Data Protector does not properly validate EXEC_CMD arguments, which allows remote attackers to execute arbitrary Perl code via a crafted command, related to the "local bin directory."
References
Configurations
History
21 Nov 2024, 01:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-hp - | |
References | () http://marc.info/?l=bugtraq&m=130391284726795&w=2 - | |
References | () http://securityreason.com/securityalert/8261 - | |
References | () http://securityreason.com/securityalert/8323 - | |
References | () http://securityreason.com/securityalert/8329 - | |
References | () http://www.securityfocus.com/bid/46234 - | |
References | () http://www.vupen.com/english/advisories/2011/0308 - Vendor Advisory | |
References | () http://zerodayinitiative.com/advisories/ZDI-11-055/ - |
Information
Published : 2011-02-09 01:00
Updated : 2025-04-11 00:51
NVD link : CVE-2011-0923
Mitre link : CVE-2011-0923
CVE.ORG link : CVE-2011-0923
JSON object : View
Products Affected
hp
- data_protector
CWE
CWE-20
Improper Input Validation