Computer Security
[EN] securityvulns.ru no-pyccku


HP Device Access Manager for Protect Tools Information Store ActiveX memory corruption
updated since 04.12.2011
Published:09.07.2012
Source:
SecurityVulns ID:12066
Type:client
Threat Level:
5/10
Description:Buffer overflows in different methods.
Affected:HP : HP Device Access Manager for Protect Tools Information Store 6.1
 HP : HP ProtectTools Enterprise Device Access Manager 5
CVE:CVE-2011-4162 (The (1) AddUser, (2) AddUserEx, (3) RemoveUser, (4) RemoveUserByGuide, (5) RemoveUserEx, and (6) RemoveUserRegardless methods in HP Protect Tools Device Access Manager (PTDAM) before 6.1.0.1 allow remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a long SidString argument.)
Original documentdocumentHP, [security bulletin] HPSBGN02750 SSRT100795 rev.1 - HP ProtectTools Enterprise Device Access Manager Running on Windows, Remote Execution of Arbitrary Code, Denial of Service (DoS) (09.07.2012)
 documentHP, [security bulletin] HPSBHF02723 SSRT100536 rev.1 - HP Protect Tools Device Access Manager for Windows, Remote Execution of Arbitrary Code, Denial of Service (04.12.2011)
 documentHigh-Tech Bridge Security Research, Heap Memory Corruption in HP Device Access Manager for Protect Tools Information Store (04.12.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod