SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   HPE Protect Tools Vendors:   HPE
HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code
SecurityTracker Alert ID:  1026367
SecurityTracker URL:  http://securitytracker.com/id/1026367
CVE Reference:   CVE-2011-4162   (Links to External Site)
Updated:  Jul 5 2012
Original Entry Date:  Dec 2 2011
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): PTDAM prior to 6.1.0.1; EDAM versions v1, v3, and v5
Description:   A vulnerability was reported in HP Protect Tools Device Access Manager for Windows. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

No details were provided.

The HP ProtectTools Enterprise Device Access Manager (EDAM) is also affected.

The following devices are affected when running the vulnerable software:

HP EliteBook 2560p Notebook PC
HP EliteBook 2760p Notebook PC
HP EliteBook 8460p Notebook PC
HP EliteBook 8460w Mobile Workstation
HP EliteBook 8560p Notebook PC
HP EliteBook 8560w Mobile Workstation
HP EliteBook 8760w Mobile Workstation
HP ProBook 4230s Notebook PC
HP ProBook 4330s Notebook PC
HP ProBook 4331s Notebook PC
HP ProBook 4430s Notebook PC
HP ProBook 4431s Notebook PC
HP ProBook 4435s Notebook PC
HP ProBook 4436s Notebook PC
HP ProBook 4530s Notebook PC
HP ProBook 4535s Notebook PC
HP ProBook 4730s Notebook PC
HP ProBook 5330m Notebook PC
HP ProBook 6360b Notebook PC
HP ProBook 6460b Notebook PC
HP ProBook 6465b Notebook PC
HP ProBook 6560b Notebook PC
HP ProBook 6565b Notebook PC
HP EliteBook 8730w Mobile Workstation
HP EliteBook 8740w Mobile Workstation
HP EliteBook 8440w Mobile Workstation
HP EliteBook 8440p Notebook PC
HP EliteBook 6930p Notebook PC
HP Compaq 6730b Notebook PC
HP ProBook 6450b Notebook PC
HP ProBook 6550b Notebook PC
HP ProBook 6440b Notebook PC
HP ProBook 6540b Notebook PC
HP Compaq 6530b Notebook PC
HP ProBook 5220m Notebook PC
HP ProBook 5310m Notebook PC
HP ProBook 5320m Notebook PC
HP ProBook 4320s Notebook PC
HP ProBook 4420s Notebook PC
HP ProBook 4321s Notebook PC
HP ProBook 4421s Notebook PC
HP Compaq 2230s Notebook PC
HP ProBook 4310s Notebook PC
HP ProBook 4311s Notebook PC
HP ProBook 4710s Notebook PC
HP EliteBook 2730p Notebook PC
HP EliteBook 2740p Tablet PC
HP 2740 Expansion Base
HP ProBook 4525s Notebook PC
HP ProBook 4415s Notebook PC
HP ProBook 4515s Notebook PC
HP ProBook 4416s Notebook PC
HP ProBook 4325s Notebook PC

Brian Mariani of High-Tech Bridge SA reported this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can cause denial of service conditions.

Solution:   The vendor has issued a fix (PTDAM 6.1.0.1; fixes also available for EDAM).

The vendor's advisories are available at:

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03082368
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03243374

Vendor URL:  h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03082368 (Links to External Site)
Cause:   Not specified
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC