Vulnerable Systems:
* Hewlett-Packard Data Protector
Authentication is not required to exploit these vulnerabilities.
The specific flaws exist within the crs.exe process which listens on a random TCP port. The process fails to properly handle multiple message types and copies user-supplied data into fixed-length buffers. A remote attacker can abuse this to execute remote code under the context of the SYSTEM user.