Buffer Overflow in HP Device Access Manager for Protect Tools Information Store
|Product:||HP Device Access Manager for Protect Tools Information Store|
|Vulnerable Versions:||Prior to v.126.96.36.199|
|Advisory Publication:||August 26, 2011 [without technical details]|
|Vendor Notification:||August 26, 2011|
|Public Disclosure:||December 1, 2011|
|Latest Update:||December 2, 2011|
|Vulnerability Type:||Buffer Errors [CWE-119]|
|CVSSv2 Base Score:||9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)|
|Solution Status:||Fixed by Vendor|
|Discovered and Provided:||High-Tech Bridge Security Research Lab|
High-Tech Bridge SA Security Research Lab has discovered vulnerabilities in HP Device Access Manager for Protect Tools Information Store which could be exploited to compromise vulnerable system.
HP has made HP Protect Tools Device Access Manager (PTDAM) for Windows updates available to resolve the vulnerability for products running PTDAM v6 software.
PTDAM v188.8.131.52 or subsequent is provided as a SoftPaq in the Download drivers and software page for each impacted product listed above.
To access the updated software, go to www.hp.com then
- select support and drivers
- go to drivers and software
- enter the PC model number
- select the Windows operating system version from the table
- The Protect Tools Device Access Manager is available as a download from the Download drivers and software page
- Choose the latest Device Access Manager for Protect Tools (v184.108.40.206 or subsequent)
| High-Tech Bridge Advisory HTB23044 - https://www.immuniweb.com/advisory/HTB23044 - Buffer Overflow in HP Device Access Manager for Protect Tools Information Store.|
 Device Access Manager for HP ProtectTools - http://www.hp.com/ - The Device Access Manager allows administrators to control access to the devices on a system and protect against unauthorized access on supported notebooks with supported operating systmes.
 Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
 Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
Please feel free to send us any additional information related to this Advisory, such as vulnerable versions, additional exploitation details and conditions, patches and other relevant details.