First published: Wed Feb 09 2011(Updated: )
The client in HP Data Protector does not properly validate EXEC_CMD arguments, which allows remote attackers to execute arbitrary Perl code via a crafted command, related to the "local bin directory."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HP Data Protector |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0923 is classified as a critical vulnerability due to its potential for arbitrary code execution.
To mitigate CVE-2011-0923, ensure that you are using the latest version of HP Data Protector where this vulnerability is addressed.
CVE-2011-0923 enables remote attackers to execute arbitrary Perl code by exploiting improperly validated EXEC_CMD arguments.
CVE-2011-0923 specifically affects HP Data Protector regardless of its version.
No authentication is required to exploit CVE-2011-0923, making it particularly dangerous for vulnerable installations.