First published: Sat May 07 2011(Updated: )
Directory traversal vulnerability in OmniInet.exe in the Backup Client Service in HP OpenView Storage Data Protector 6.00, 6.10, and 6.11 allows remote attackers to read arbitrary files via directory traversal sequences in a filename in a GET_FILE message.
Credit: hp-security-alert@hp.com
Affected Software | Affected Version | How to fix |
---|---|---|
HP OpenView Storage Data Protector Cell Manager | =6.11 | |
HP OpenView Storage Data Protector Cell Manager | =6.00 | |
HP OpenView Storage Data Protector Cell Manager | =6.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1736 is considered a high severity vulnerability due to its potential to allow unauthorized access to sensitive files.
To mitigate CVE-2011-1736, update to a patched version of HP OpenView Storage Data Protector that addresses the directory traversal vulnerability.
Affected versions of HP OpenView Storage Data Protector include 6.00, 6.10, and 6.11.
Remote attackers with knowledge of this vulnerability can exploit CVE-2011-1736 to read arbitrary files on systems running the affected versions.
Yes, if exploited, CVE-2011-1736 can lead to unauthorized access to sensitive information, potentially resulting in data breaches.