The client in HP Data Protector does not verify the contents of files associated with the EXEC_CMD command, which allows remote attackers to execute arbitrary script code by providing this code with a trusted filename, as demonstrated by omni_chk_ds.sh.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-hp | |
http://marc.info/?l=bugtraq&m=130391284726795&w=2 | vendor advisory |
http://www.vupen.com/english/advisories/2011/0308 | vdb entry vendor advisory |
http://www.securityfocus.com/archive/1/516258/100/0/threaded | mailing list |
http://zerodayinitiative.com/advisories/ZDI-11-054/ | |
http://www.securityfocus.com/bid/46234 | vdb entry |