This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.
The backup service running on the remote host is affected by a remote
code execution vulnerability.
According to its version and build number, the HP Data Protector
application running on the remote host is affected by a stack-based
buffer overflow condition in the backup client service daemon
(OmniInet.exe). An unauthenticated, remote attacker can exploit this,
via an MSG_PROTOCOL command with long arguments, to corrupt memory,
resulting in the execution of arbitrary code.
See also :
Apply the relevant patches referenced in the HP advisory.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true