HP Data Protector Express Opcode 0x330 Parsing Remote Code Execution Exploit

A buffer Overflow exists within the dpwinsdr.exe process which listens on TCP port 3817 by default. The process has insufficient bounds checking on user-supplied data copied to a fixed-length buffer on the stack. Remote, unauthenticated attackers can exploit this vulnerability by sending malformed opcode 0x330 message packets to the target.
Exploit Type - Old
Exploits/Remote
Exploit Platform
Exploit Type
Product Name