| CVE ID | CVE-2013-2335 | 
| CVSS SCORE | 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C | 
| AFFECTED VENDORS | 
                            
                            
                            Hewlett-Packard | 
                    
| AFFECTED PRODUCTS | 
                            
                            
                            Data Protector | 
                    
| TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['12675']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com | 
| VULNERABILITY DETAILS | 
                             
 The specific flaw exists within crs.exe which listens by default on a random TCP port. When parsing opcode 227, the process blindly copies user supplied data into a fixed-length stack buffer. A remote attacker can abuse this to execute remote code under the context of the SYSTEM user.  | 
                    
| ADDITIONAL DETAILS | 
                            
                            
                            Hewlett-Packard has issued an update to correct this vulnerability. More details can be found at:
                             https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03781657  | 
                    
| DISCLOSURE TIMELINE | 
                            
  | 
                    
| CREDIT | Brian Gorenc HP Zero Day Initiative  |