HP Data Protector Express Crafted Traffic Remote Memory Disclosure

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains an application that is affected by a
local privilege escalation vulnerability.

Description :

HP Data Protector Express is installed on the remote host. The
installed version of the software is affected by an unspecified local
privilege escalation vulnerability. A local attacker could exploit
this vulnerability to trigger a denial of service condition or execute
arbitrary code with system level privileges. According to reports,
this flaw could also be triggered remotely by exploiting a memory
leak vulnerability, see references for more information.

See also :

http://ivizsecurity.com/security-advisory-iviz-sr-09002.html
http://www.nessus.org/u?bbd5cf40
http://www.securityfocus.com/archive/1/503482

Solution :

Upgrade to HP Data Protector Express Single Server Edition version
3.5 SP2 build 47065 / 4.0 SP1 build 46537 or later.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 5.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 38792 (hp_data_protector_exp_priv_escalation.nasl)

Bugtraq ID: 34955

CVE ID: CVE-2009-0714

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now