HP Data Protector Express Opcode 0x330 Parsing Remote Code Execution Exploit

A buffer Overflow exists within the dpwinsdr.exe process which listens on TCP port 3817 by default. The process has insufficient bounds checking on user-supplied data copied to a fixed-length buffer on the stack. Remote, unauthenticated attackers can exploit this vulnerability by sending malformed opcode 0x330 message packets to the target.
Exploit type: 
Vulnerabilty ID: 
Product Version: 
Released Date: 
Monday, November 5, 2012 - 00:00