HP.Data.Protector.EXECBAR.User.Name.Remote.Code.Execution
Description
This indicates an attack attempt to exploit a Remote Code Execution vulnerability in HP Data Protector.
The vulnerability is due to parsing a malformed user name field in an EXEC_BAR request, the process blindly copies user supplied data into a fixed-length stack buffer. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted request.
Affected Products
HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply patch available from the website.
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c05085988
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2021-10-27 | 18.186 | Sig Added |