Check Point Reference: | CPAI-2011-548 |
Date Published: | 6 Dec 2011 |
Severity: | Critical |
Last Updated: | Tuesday 10 November, 2015 |
Source: | |
Industry Reference: | CVE-2011-1729 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | A remote code execution vulnerability has been reported in HP Data Protector. The vulnerability is due to insufficient boundary checks of user-supplied parameters in the vulnerable function while handling GET_FILE messages. A remote attacker could exploit this vulnerability by sending a malformed GET_FILE request to the target server. Successful exploitation could result in arbitrary code execution in the security context of the running service. |
This protection will detect and block malformed GET_FILE messages.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: HP Products Protection Violation.
Attack Information: HP Data Protector Backup Client Service GET_FILE buffer overflow.