CVE-2010-3007 – Hewlett-Packard Data Protector DtbClsLogin Utf8cpy Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2010-3007
Unspecified vulnerability in HP Data Protector Express, and Data Protector Express Single Server Edition (SSE), 3.x before build 56936 and 4.x before build 56906 allows local users to gain privileges or cause a denial of service via unknown vectors. Vulnerabilidad no especificada en HP Data Protector Express y Data Protector Express Single Server Edition (SSE), v3.x anterior a build 56936 y v4.x anterior a build 56906 permite a usuarios locales conseguir privilegios o causar una denegación de servicio a través de vectores desconocidos. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Data Protector. Authentication is not required to exploit this vulnerability. The specific flaw exists within the function DtbClsLogin defined in the module dpwindtb.dll on Windows and libdplindtb.so on Linux. This function takes user supplied input and copies it directly to a stack buffer. • https://www.exploit-db.com/exploits/23290 http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02498535 •
CVE-2009-0714 – HP Data Protector 4.00-SP1b43064 - Remote Memory Leak/Denial of Service
https://notcve.org/view.php?id=CVE-2009-0714
Unspecified vulnerability in the dpwinsup module (dpwinsup.dll) for dpwingad (dpwingad.exe) in HP Data Protector Express and Express SSE 3.x before build 47065, and Express and Express SSE 4.x before build 46537, allows remote attackers to cause a denial of service (application crash) or read portions of memory via one or more crafted packets. Vulnerabilidad no especificada en el módulo dpwinsup (dpwinsup.dll) para dpwingad (dpwingad.exe) en HP Data Protector Express y Express SSE 3.x en versiones anteriores a build 47065 y Express y Express SSE 4.x en versiones anteriores a build 46537, permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) o lectura de porciones de memoria a través de uno o más paquetes manipulados. • https://www.exploit-db.com/exploits/9006 https://www.exploit-db.com/exploits/9007 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01697543 http://ivizsecurity.com/security-advisory-iviz-sr-09002.html http://secunia.com/advisories/35084 http://www.securityfocus.com/bid/34955 http://www.securitytracker.com/id?1022220 http://www.vupen.com/english/advisories/2009/1309 •