HP Data Protector Remote Command Execution

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote service allows remote execution of arbitrary commands
without authentication.

Description :

The remote HP Data Protector client or server service is affected by
a command execution vulnerability. A malicious user can send a
specially crafted packet that causes this service to execute an
arbitrary shell command with system privileges.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-11-055/
http://archives.neohapsis.com/archives/bugtraq/2011-02/0076.html
http://www.nessus.org/u?6ca03389

Solution :

1. Upgrade to Data Protector A.06.20 or later and

2. Enable encrypted control communication services on cell server and
all clients in cell.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Gain a shell remotely

Nessus Plugin ID: 53641 ()

Bugtraq ID: 46234

CVE ID: CVE-2011-0923