Vulnerabilites related to ibm - tivoli_storage_manager_express
Vulnerability from fkie_nvd
Published
2008-10-31 00:00
Modified
2024-11-21 00:52
Severity ?
Summary
Heap-based buffer overflow in the Data Protection for SQL CAD service (aka dsmcat.exe) in the Client Acceptor Daemon (CAD) and the scheduler in the Backup-Archive client 5.1.0.0 through 5.1.8.1, 5.2.0.0 through 5.2.5.2, 5.3.0.0 through 5.3.6.1, 5.4.0.0 through 5.4.2.2, and 5.5.0.0 through 5.5.0.91 in IBM Tivoli Storage Manager (TSM); and the Backup-Archive client in TSM Express; allows remote attackers to execute arbitrary code by sending a large amount of crafted data to a TCP port.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AB2004B-D192-466B-8D82-054DBF48CF46", "versionEndIncluding": "5.1.8.1", "versionStartIncluding": "5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "47EB988A-4087-4AFA-B80D-2B9F4960FE67", "versionEndIncluding": "5.2.5.2", "versionStartIncluding": "5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B92E241-555F-4D68-B090-740DEA7CE674", "versionEndIncluding": "5.3.6.1", "versionStartIncluding": "5.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "B114A3EE-376F-4C45-8768-5D0BC4439808", "versionEndIncluding": "5.4.2.2", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "29656C7B-3716-4042-9114-3E352B328C16", "versionEndIncluding": "5.5.0.91", "versionStartIncluding": "5.5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_express:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF1C67A0-883B-4703-A6A7-1345AC65C32F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the Data Protection for SQL CAD service (aka dsmcat.exe) in the Client Acceptor Daemon (CAD) and the scheduler in the Backup-Archive client 5.1.0.0 through 5.1.8.1, 5.2.0.0 through 5.2.5.2, 5.3.0.0 through 5.3.6.1, 5.4.0.0 through 5.4.2.2, and 5.5.0.0 through 5.5.0.91 in IBM Tivoli Storage Manager (TSM); and the Backup-Archive client in TSM Express; allows remote attackers to execute arbitrary code by sending a large amount of crafted data to a TCP port." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en mont\u00edculo en la Protecci\u00f3n de Datos para el servicio SQL CAD (tambi\u00e9n conocido como dsmcat.exe) en Client Acceptor Daemon (CAD Demonio Aceptador de Clientes) y el programador en el cliente de archivos de respaldo de v5.1.0.0 a v5.1.8.1, de v5.2.0.0 a v5.2.5.2, de v5.3.0.0 a v5.3.6.1, de v5.4.0.0 a v5.4.2.2 y de v5.5.0.0 a v5.5.0.91 en Tivoli Storage Manager (TSM)de IBM; y el cliente de archivos de respaldo en TSM Express; permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n enviando una gran cantidad de datos manipulados a un puerto TCP." } ], "id": "CVE-2008-4801", "lastModified": "2024-11-21T00:52:36.080", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-10-31T00:00:00.780", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/32465" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21322623" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC56773" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/497950/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/31988" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1021122" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2969" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-071/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/32465" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21322623" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC56773" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/497950/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/31988" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1021122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-071/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46208" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-05-05 17:30
Modified
2024-11-21 00:52
Severity ?
Summary
Multiple stack-based buffer overflows in dsmagent.exe in the Remote Agent Service in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, and 5.4.0.0 through 5.4.1.96, and the TSM Express client 5.3.3.0 through 5.3.6.4, allow remote attackers to execute arbitrary code via (1) a request packet that is not properly parsed by an unspecified "generic string handling function" or (2) a crafted NodeName in a dicuGetIdentifyRequest request packet, related to the (a) Web GUI and (b) Java GUI.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ibm | tivoli_storage_manager_client | 5.1 | |
ibm | tivoli_storage_manager_client | 5.1.8.0 | |
ibm | tivoli_storage_manager_client | 5.1.8.2 | |
ibm | tivoli_storage_manager_client | 5.2 | |
ibm | tivoli_storage_manager_client | 5.2.5.1 | |
ibm | tivoli_storage_manager_client | 5.2.5.2 | |
ibm | tivoli_storage_manager_client | 5.2.5.3 | |
ibm | tivoli_storage_manager_client | 5.3 | |
ibm | tivoli_storage_manager_client | 5.3.5.2 | |
ibm | tivoli_storage_manager_client | 5.3.5.3 | |
ibm | tivoli_storage_manager_client | 5.3.6.3 | |
ibm | tivoli_storage_manager_client | 5.3.6.4 | |
ibm | tivoli_storage_manager_client | 5.4 | |
ibm | tivoli_storage_manager_client | 5.4.1.1 | |
ibm | tivoli_storage_manager_client | 5.4.1.2 | |
ibm | tivoli_storage_manager_client | 5.4.1.96 | |
ibm | tivoli_storage_manager_express | 5.3 | |
ibm | tivoli_storage_manager_express | 5.3.3.0 | |
ibm | tivoli_storage_manager_express | 5.3.6.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "5249F29D-A30C-47DE-A2E7-1643506833B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BF8BBC00-2EE5-4679-9A55-C160C3FE0502", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "AEE65DEA-32C5-4AF3-BD3F-B6650BC7C3A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "0775DC8E-AFEF-4EC8-A42F-ACB266087F44", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B5CF5583-AD0F-41A9-A963-077D4592EE95", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "91C00917-D04A-480F-AE51-7F666A092A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD374314-ACC9-4F14-A65F-14761B04B483", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "F1E0A6F7-EB54-49AC-BA68-FFAFEEBF82B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "488891DD-FDF9-45B6-8E27-9488016617E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "FC9FD3F9-CADE-4B7F-B44D-87910F093842", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E985452D-8819-493B-A505-98E393224AF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "7FADD1A6-5E07-4701-9846-389DBB980040", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "4DCA554F-03B3-44E1-A175-E3163445626E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "29442ECF-F9F0-42CE-92BD-0C04A8E2556C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "02303411-3A86-49B4-BF41-E7103E424F1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.96:*:*:*:*:*:*:*", "matchCriteriaId": "0AD6AF10-1F26-46AD-8137-E9246D09EC29", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5E6A344-E062-4179-9CFA-CF912B4AED16", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A140293-8F4A-4AB4-9EE8-36D0EB398C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "AABAD076-C9D6-481E-B9DC-CEB95C224979", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in dsmagent.exe in the Remote Agent Service in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, and 5.4.0.0 through 5.4.1.96, and the TSM Express client 5.3.3.0 through 5.3.6.4, allow remote attackers to execute arbitrary code via (1) a request packet that is not properly parsed by an unspecified \"generic string handling function\" or (2) a crafted NodeName in a dicuGetIdentifyRequest request packet, related to the (a) Web GUI and (b) Java GUI." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer basados en pila en dsmagent.exe en el agente de servicio remoto en el cliente IBM Tivoli Storage Manager (TSM) desde v5.1.0.0 hasta v5.1.8.2, desde v5.2.0.0 hasta 5.2.5.3, desde v5.3.0.0 hasta v5.3.6.4, y desde v5.4.0.0 hasta v5.4.1.96, y el cliente TSM Express desde v5.3.3.0 hasta v5.3.6.4, permite atacantes remotos ejecutar c\u00f3digo de forma arbitraria a trav\u00e9s de (1) una petici\u00f3n de paquete que no esta adecuadamente parseada mediante una \"funci\u00f3n gen\u00e9rica de manejo de cadena\" inespec\u00edfica o (2) un \"NodeName\" manipulado en una petici\u00f3n de paquete \"dicuGetIdentifyRequest\", relacionado con (a) Interfaz gr\u00e1fico de usuario y (b) interfaz gr\u00e1fico de usuario Java." } ], "id": "CVE-2008-4828", "lastModified": "2024-11-21T00:52:40.317", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-05-05T17:30:00.187", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://osvdb.org/54231" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://osvdb.org/54232" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://secunia.com/advisories/32604" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2008-55/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC59513" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/503182/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.vupen.com/english/advisories/2009/1235" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/54231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/54232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/32604" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2008-55/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC59513" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/503182/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50327" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-01-12 02:46
Modified
2024-11-21 00:41
Severity ?
Summary
Heap-based buffer overflow in the Express Backup Server service (dsmsvc.exe) in IBM Tivoli Storage Manager (TSM) Express 5.3 before 5.3.7.3 allows remote attackers to execute arbitrary code via a packet with a large length value.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ibm | tivoli_storage_manager_express | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_express:*:*:*:*:*:*:*:*", "matchCriteriaId": "294B0912-280C-45AA-822F-911FEB96986B", "versionEndIncluding": "5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the Express Backup Server service (dsmsvc.exe) in IBM Tivoli Storage Manager (TSM) Express 5.3 before 5.3.7.3 allows remote attackers to execute arbitrary code via a packet with a large length value." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en el servicio Express Backup Server (archivo dsmsvc.exe) en IBM Tivoli Storage Manager (TSM) Express versiones 5.3 anteriores a 5.3.7.3, permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un paquete con un valor de longitud largo." } ], "id": "CVE-2008-0247", "lastModified": "2024-11-21T00:41:29.810", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-01-12T02:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/28440" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21291536" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/486270/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/27235" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019182" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0106" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-001.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39604" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/28440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21291536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/486270/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/27235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019182" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39604" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-05-05 17:30
Modified
2024-11-21 01:02
Severity ?
Summary
Buffer overflow in the Web GUI in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17 allows attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ibm | tivoli_storage_manager_client | 5.1 | |
ibm | tivoli_storage_manager_client | 5.1.8.0 | |
ibm | tivoli_storage_manager_client | 5.1.8.2 | |
ibm | tivoli_storage_manager_client | 5.2 | |
ibm | tivoli_storage_manager_client | 5.2.5.1 | |
ibm | tivoli_storage_manager_client | 5.2.5.2 | |
ibm | tivoli_storage_manager_client | 5.2.5.3 | |
ibm | tivoli_storage_manager_client | 5.3 | |
ibm | tivoli_storage_manager_client | 5.3.5.2 | |
ibm | tivoli_storage_manager_client | 5.3.5.3 | |
ibm | tivoli_storage_manager_client | 5.3.6.3 | |
ibm | tivoli_storage_manager_client | 5.3.6.4 | |
ibm | tivoli_storage_manager_client | 5.4 | |
ibm | tivoli_storage_manager_client | 5.4.1.1 | |
ibm | tivoli_storage_manager_client | 5.4.1.2 | |
ibm | tivoli_storage_manager_client | 5.4.1.96 | |
ibm | tivoli_storage_manager_express | 5.3 | |
ibm | tivoli_storage_manager_express | 5.3.3.0 | |
ibm | tivoli_storage_manager_express | 5.3.6.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "5249F29D-A30C-47DE-A2E7-1643506833B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BF8BBC00-2EE5-4679-9A55-C160C3FE0502", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "AEE65DEA-32C5-4AF3-BD3F-B6650BC7C3A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "0775DC8E-AFEF-4EC8-A42F-ACB266087F44", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B5CF5583-AD0F-41A9-A963-077D4592EE95", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "91C00917-D04A-480F-AE51-7F666A092A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD374314-ACC9-4F14-A65F-14761B04B483", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "F1E0A6F7-EB54-49AC-BA68-FFAFEEBF82B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "488891DD-FDF9-45B6-8E27-9488016617E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "FC9FD3F9-CADE-4B7F-B44D-87910F093842", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "E985452D-8819-493B-A505-98E393224AF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "7FADD1A6-5E07-4701-9846-389DBB980040", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "4DCA554F-03B3-44E1-A175-E3163445626E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "29442ECF-F9F0-42CE-92BD-0C04A8E2556C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "02303411-3A86-49B4-BF41-E7103E424F1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1.96:*:*:*:*:*:*:*", "matchCriteriaId": "0AD6AF10-1F26-46AD-8137-E9246D09EC29", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5E6A344-E062-4179-9CFA-CF912B4AED16", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A140293-8F4A-4AB4-9EE8-36D0EB398C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "AABAD076-C9D6-481E-B9DC-CEB95C224979", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Web GUI in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17 allows attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el interfaz gr\u00e1fico de usuario Web en el cliente IBM Tivoli Storage Manager (TSM) desde v5.1.0.0 hasta v5.1.8.2, desde v5.2.0.0 hasta v5.2.5.3, desde v5.3.0.0 hasta v5.3.6.4, desde v5.4.0.0 hasta v5.4.2.6, y desde v5.5.0.0 hasta v5.5.1.17 permite a atacantes producir una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) o ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores inespec\u00edficos." } ], "id": "CVE-2009-1520", "lastModified": "2024-11-21T01:02:39.373", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-05-05T17:30:00.280", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/32604" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC59994" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/1235" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/32604" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC59994" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50328" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-03-11 14:19
Modified
2024-11-21 00:51
Severity ?
Summary
Heap-based buffer overflow in adsmdll.dll 5.3.7.7296, as used by the daemon (dsmsvc.exe) in the backup server in IBM Tivoli Storage Manager (TSM) Express 5.3.7.3 and earlier and TSM 5.2, 5.3 before 5.3.6.0, and 5.4.0.0 through 5.4.4.0, allows remote attackers to execute arbitrary code via a crafted length value.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | windows | * | |
ibm | tivoli_storage_manager | 5.2 | |
ibm | tivoli_storage_manager | 5.3 | |
ibm | tivoli_storage_manager | 5.3.0 | |
ibm | tivoli_storage_manager | 5.3.1 | |
ibm | tivoli_storage_manager | 5.3.2 | |
ibm | tivoli_storage_manager | 5.3.2.4 | |
ibm | tivoli_storage_manager | 5.3.3 | |
ibm | tivoli_storage_manager | 5.3.4 | |
ibm | tivoli_storage_manager | 5.3.5.1 | |
ibm | tivoli_storage_manager | 5.4.0 | |
ibm | tivoli_storage_manager | 5.4.1 | |
ibm | tivoli_storage_manager | 5.4.2 | |
ibm | tivoli_storage_manager | 5.4.2.2 | |
ibm | tivoli_storage_manager | 5.4.2.3 | |
ibm | tivoli_storage_manager | 5.4.2.4 | |
ibm | tivoli_storage_manager | 5.4.4.0 | |
ibm | tivoli_storage_manager_express | 5.3 | |
ibm | tivoli_storage_manager_express | 5.3.3.0 | |
ibm | tivoli_storage_manager_express | 5.3.6.4 | |
ibm | tivoli_storage_manager_express | 5.3.7.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "EA28A2C9-21A0-48E2-88DD-C2336D990523", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "801CCEC1-8DED-41C4-B6D2-38E4BEC74EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A263333E-DB86-41BE-A508-731079429E62", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E5F0611-DD8F-42A2-AFD7-1BCBD38BAB4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "25121FC4-9EE2-44AE-BEB3-02C3AB38DB61", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "93FCB242-C35B-4CDB-AE62-3CA5D312586B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "70016926-5776-4A04-8D55-5CA12D1DA9B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "930B5AE2-CA47-47D7-96DE-F2B9F70337C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:5.3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "3FAA5227-C1F5-48C1-A207-096F228E305E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "11E968D1-8198-4686-BFDD-8499CB435B56", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "40A8E0C4-8509-4372-99C7-CFBA2100AEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5CBC191E-0CE6-4D9C-A75B-E3484AC3B4DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F956AF3F-0BDF-4F4B-AB29-418C39BEC8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "0642EDE5-7EBF-4FA3-9432-F82FE76EF9EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "F4C19266-CDED-4DC0-8B50-560BA3B5DAC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager:5.4.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "3BD18D39-DA8A-4C58-A18B-14EB6BEFBFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5E6A344-E062-4179-9CFA-CF912B4AED16", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A140293-8F4A-4AB4-9EE8-36D0EB398C66", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "AABAD076-C9D6-481E-B9DC-CEB95C224979", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "77114204-172B-4E6A-AFFE-E6123458F0C3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in adsmdll.dll 5.3.7.7296, as used by the daemon (dsmsvc.exe) in the backup server in IBM Tivoli Storage Manager (TSM) Express 5.3.7.3 and earlier and TSM 5.2, 5.3 before 5.3.6.0, and 5.4.0.0 through 5.4.4.0, allows remote attackers to execute arbitrary code via a crafted length value." }, { "lang": "es", "value": "Un desbordamiento del b\u00fafer en la regi\u00f3n heap de la memoria en la biblioteca adsmdll.dll versi\u00f3n 5.3.7.7296, como es usada por el demonio (dsmsvc.exe) en el servidor de respaldo en Tivoli Storage Manager (TSM) Express de IBM versi\u00f3n 5.3.7.3 y anteriores y TSM versi\u00f3n 5.2, versiones 5.3 anteriores a 5.3.6.0 , y versiones 5.4.0.0 hasta 5.4.4.0, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de un valor de longitud dise\u00f1ado." } ], "id": "CVE-2008-4563", "lastModified": "2024-11-21T00:51:59.243", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-11T14:19:15.187", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0192.html" }, { "source": "cve@mitre.org", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=775" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/52617" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34245" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1021837" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21377388" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/34077" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0669" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0192.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=775" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/52617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1021837" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21377388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0669" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49188" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-05-05 17:30
Modified
2024-11-21 01:02
Severity ?
Summary
Unspecified vulnerability in the Java GUI in the IBM Tivoli Storage Manager (TSM) client 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.5, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17, and the TSM Express client 5.3.3.0 through 5.3.6.5, allows attackers to read or modify arbitrary files via unknown vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ibm | tivoli_storage_manager_client | 5.2.0 | |
ibm | tivoli_storage_manager_client | 5.2.2 | |
ibm | tivoli_storage_manager_client | 5.2.3 | |
ibm | tivoli_storage_manager_client | 5.2.4 | |
ibm | tivoli_storage_manager_client | 5.2.5 | |
ibm | tivoli_storage_manager_client | 5.3.0 | |
ibm | tivoli_storage_manager_client | 5.3.2 | |
ibm | tivoli_storage_manager_client | 5.3.3 | |
ibm | tivoli_storage_manager_client | 5.3.4 | |
ibm | tivoli_storage_manager_client | 5.3.5 | |
ibm | tivoli_storage_manager_client | 5.3.6 | |
ibm | tivoli_storage_manager_client | 5.4.0 | |
ibm | tivoli_storage_manager_client | 5.4.1 | |
ibm | tivoli_storage_manager_client | 5.4.2 | |
ibm | tivoli_storage_manager_client | 5.5.0 | |
ibm | tivoli_storage_manager_client | 5.5.1 | |
ibm | tivoli_storage_manager_express | 5.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "628DBF06-F69A-4912-B0D8-DEE9EFD830AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A077B803-1CB7-4068-9C03-6E10D24D82A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "8D6A5DEA-1308-4A36-B7CF-4F8B6CEB5994", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "7F3EE328-1E1E-4D20-B41A-D381D5E60D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF328830-D1B6-462F-B504-C85495D14229", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "4881A76F-B6DB-4E9E-90C4-C2773A698EB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "0832F6E5-99D1-4A27-A308-BDF637F9C417", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "93E31155-39D3-4EB5-988E-7AAB83C6A3AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "4371D56F-F69B-421A-A098-BFD965636B32", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "4C2775F4-0353-4FEE-89BA-BE18BB933BCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "F6A3EF8F-A50D-4C8F-ABFF-73AF3F265F14", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2D721F7-B62A-48C8-9D6D-A69E24AE94BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "77A527E6-7428-43C6-A313-2B4D4ED9811E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "ABB38022-F071-4ACB-A720-53766F20BDDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7C65A37A-AB50-4325-A0BF-E99F46463A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_client:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "CD4C86D9-79E2-49C7-AD10-48FB2E4CDF6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_express:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "F5E6A344-E062-4179-9CFA-CF912B4AED16", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Java GUI in the IBM Tivoli Storage Manager (TSM) client 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.5, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17, and the TSM Express client 5.3.3.0 through 5.3.6.5, allows attackers to read or modify arbitrary files via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad inespec\u00edfica en Java GUI en el cliente IBM Tivoli Storage Manager (TSM) desde v5.2.0.0 hasta v5.2.5.3, desde v5.3.0.0 hasta v5.3.6.5, desde v5.4.0.0 hasta v5.4.2.6, y desde v5.5.0.0 hasta v5.5.1.17, y el cliente TSM Express desde v5.3.3.0 hasta v5.3.6.5, permite a atacantes remotos leer o modificar ficheros de forma arbitraria a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2009-1521", "lastModified": "2024-11-21T01:02:39.520", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-05-05T17:30:00.297", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/32604" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC59779" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/1235" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/32604" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC59779" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50329" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2008-4563
Vulnerability from cvelistv5
Published
2009-03-11 14:00
Modified
2024-08-07 10:24
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in adsmdll.dll 5.3.7.7296, as used by the daemon (dsmsvc.exe) in the backup server in IBM Tivoli Storage Manager (TSM) Express 5.3.7.3 and earlier and TSM 5.2, 5.3 before 5.3.6.0, and 5.4.0.0 through 5.4.4.0, allows remote attackers to execute arbitrary code via a crafted length value.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/34077 | vdb-entry, x_refsource_BID | |
http://securitytracker.com/id?1021837 | vdb-entry, x_refsource_SECTRACK | |
http://www-01.ibm.com/support/docview.wss?uid=swg21377388 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2009/0669 | vdb-entry, x_refsource_VUPEN | |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=775 | third-party-advisory, x_refsource_IDEFENSE | |
http://secunia.com/advisories/34245 | third-party-advisory, x_refsource_SECUNIA | |
http://osvdb.org/52617 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49188 | vdb-entry, x_refsource_XF | |
http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0192.html | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:24:19.002Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34077", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34077" }, { "name": "1021837", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1021837" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21377388" }, { "name": "ADV-2009-0669", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0669" }, { "name": "20090310 IBM Tivoli Storage Manager Express Heap Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=775" }, { "name": "34245", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34245" }, { "name": "52617", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/52617" }, { "name": "tivoli-tsm-adsmdll-bo(49188)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49188" }, { "name": "20090310 Assurent VR - IBM Tivoli Storage Manager Express Backup Server Heap Corruption", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0192.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-03-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in adsmdll.dll 5.3.7.7296, as used by the daemon (dsmsvc.exe) in the backup server in IBM Tivoli Storage Manager (TSM) Express 5.3.7.3 and earlier and TSM 5.2, 5.3 before 5.3.6.0, and 5.4.0.0 through 5.4.4.0, allows remote attackers to execute arbitrary code via a crafted length value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34077", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34077" }, { "name": "1021837", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1021837" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21377388" }, { "name": "ADV-2009-0669", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0669" }, { "name": "20090310 IBM Tivoli Storage Manager Express Heap Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=775" }, { "name": "34245", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34245" }, { "name": "52617", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/52617" }, { "name": "tivoli-tsm-adsmdll-bo(49188)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49188" }, { "name": "20090310 Assurent VR - IBM Tivoli Storage Manager Express Backup Server Heap Corruption", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0192.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-4563", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in adsmdll.dll 5.3.7.7296, as used by the daemon (dsmsvc.exe) in the backup server in IBM Tivoli Storage Manager (TSM) Express 5.3.7.3 and earlier and TSM 5.2, 5.3 before 5.3.6.0, and 5.4.0.0 through 5.4.4.0, allows remote attackers to execute arbitrary code via a crafted length value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34077", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34077" }, { "name": "1021837", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1021837" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21377388", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21377388" }, { "name": "ADV-2009-0669", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0669" }, { "name": "20090310 IBM Tivoli Storage Manager Express Heap Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=775" }, { "name": "34245", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34245" }, { "name": "52617", "refsource": "OSVDB", "url": "http://osvdb.org/52617" }, { "name": "tivoli-tsm-adsmdll-bo(49188)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49188" }, { "name": "20090310 Assurent VR - IBM Tivoli Storage Manager Express Backup Server Heap Corruption", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0192.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-4563", "datePublished": "2009-03-11T14:00:00", "dateReserved": "2008-10-14T00:00:00", "dateUpdated": "2024-08-07T10:24:19.002Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-4828
Vulnerability from cvelistv5
Published
2009-05-05 17:00
Modified
2024-08-07 10:31
Severity ?
EPSS score ?
Summary
Multiple stack-based buffer overflows in dsmagent.exe in the Remote Agent Service in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, and 5.4.0.0 through 5.4.1.96, and the TSM Express client 5.3.3.0 through 5.3.6.4, allow remote attackers to execute arbitrary code via (1) a request packet that is not properly parsed by an unspecified "generic string handling function" or (2) a crafted NodeName in a dicuGetIdentifyRequest request packet, related to the (a) Web GUI and (b) Java GUI.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/secunia_research/2008-55/ | x_refsource_MISC | |
http://www-01.ibm.com/support/docview.wss?uid=swg21384389 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2009/1235 | vdb-entry, x_refsource_VUPEN | |
http://www-1.ibm.com/support/docview.wss?uid=swg1IC59513 | vendor-advisory, x_refsource_AIXAPAR | |
http://osvdb.org/54232 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/archive/1/503182/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/32604 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/50327 | vdb-entry, x_refsource_XF | |
http://osvdb.org/54231 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:31:27.946Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2008-55/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389" }, { "name": "ADV-2009-1235", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1235" }, { "name": "IC59513", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC59513" }, { "name": "54232", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/54232" }, { "name": "20090504 Secunia Research: IBM Tivoli Storage Manager Remote Agent Service Buffer Overflows", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/503182/100/0/threaded" }, { "name": "32604", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32604" }, { "name": "ibm-tsm-dsmagent-bo(50327)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50327" }, { "name": "54231", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/54231" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-05-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in dsmagent.exe in the Remote Agent Service in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, and 5.4.0.0 through 5.4.1.96, and the TSM Express client 5.3.3.0 through 5.3.6.4, allow remote attackers to execute arbitrary code via (1) a request packet that is not properly parsed by an unspecified \"generic string handling function\" or (2) a crafted NodeName in a dicuGetIdentifyRequest request packet, related to the (a) Web GUI and (b) Java GUI." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2008-55/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389" }, { "name": "ADV-2009-1235", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1235" }, { "name": "IC59513", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC59513" }, { "name": "54232", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/54232" }, { "name": "20090504 Secunia Research: IBM Tivoli Storage Manager Remote Agent Service Buffer Overflows", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/503182/100/0/threaded" }, { "name": "32604", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32604" }, { "name": "ibm-tsm-dsmagent-bo(50327)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50327" }, { "name": "54231", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/54231" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2008-4828", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in dsmagent.exe in the Remote Agent Service in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, and 5.4.0.0 through 5.4.1.96, and the TSM Express client 5.3.3.0 through 5.3.6.4, allow remote attackers to execute arbitrary code via (1) a request packet that is not properly parsed by an unspecified \"generic string handling function\" or (2) a crafted NodeName in a dicuGetIdentifyRequest request packet, related to the (a) Web GUI and (b) Java GUI." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/secunia_research/2008-55/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2008-55/" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389" }, { "name": "ADV-2009-1235", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1235" }, { "name": "IC59513", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC59513" }, { "name": "54232", "refsource": "OSVDB", "url": "http://osvdb.org/54232" }, { "name": "20090504 Secunia Research: IBM Tivoli Storage Manager Remote Agent Service Buffer Overflows", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/503182/100/0/threaded" }, { "name": "32604", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32604" }, { "name": "ibm-tsm-dsmagent-bo(50327)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50327" }, { "name": "54231", "refsource": "OSVDB", "url": "http://osvdb.org/54231" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2008-4828", "datePublished": "2009-05-05T17:00:00", "dateReserved": "2008-10-31T00:00:00", "dateUpdated": "2024-08-07T10:31:27.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-0247
Vulnerability from cvelistv5
Published
2008-01-12 02:00
Modified
2024-08-07 07:39
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the Express Backup Server service (dsmsvc.exe) in IBM Tivoli Storage Manager (TSM) Express 5.3 before 5.3.7.3 allows remote attackers to execute arbitrary code via a packet with a large length value.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/28440 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/39604 | vdb-entry, x_refsource_XF | |
http://www.zerodayinitiative.com/advisories/ZDI-08-001.html | x_refsource_MISC | |
http://www-1.ibm.com/support/docview.wss?uid=swg21291536 | x_refsource_CONFIRM | |
http://www.vupen.com/english/advisories/2008/0106 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/27235 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/486270/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id?1019182 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:39:34.977Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28440", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28440" }, { "name": "ibm-tsmexpressserver-bo(39604)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39604" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21291536" }, { "name": "ADV-2008-0106", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0106" }, { "name": "27235", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27235" }, { "name": "20080114 ZDI-08-001: IBM Tivoli Storage Manager Express Backup Server Heap Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/486270/100/0/threaded" }, { "name": "1019182", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019182" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-01-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the Express Backup Server service (dsmsvc.exe) in IBM Tivoli Storage Manager (TSM) Express 5.3 before 5.3.7.3 allows remote attackers to execute arbitrary code via a packet with a large length value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "28440", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28440" }, { "name": "ibm-tsmexpressserver-bo(39604)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39604" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21291536" }, { "name": "ADV-2008-0106", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0106" }, { "name": "27235", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27235" }, { "name": "20080114 ZDI-08-001: IBM Tivoli Storage Manager Express Backup Server Heap Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/486270/100/0/threaded" }, { "name": "1019182", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019182" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0247", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the Express Backup Server service (dsmsvc.exe) in IBM Tivoli Storage Manager (TSM) Express 5.3 before 5.3.7.3 allows remote attackers to execute arbitrary code via a packet with a large length value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28440", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28440" }, { "name": "ibm-tsmexpressserver-bo(39604)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39604" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-08-001.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-001.html" }, { "name": "http://www-1.ibm.com/support/docview.wss?uid=swg21291536", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21291536" }, { "name": "ADV-2008-0106", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0106" }, { "name": "27235", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27235" }, { "name": "20080114 ZDI-08-001: IBM Tivoli Storage Manager Express Backup Server Heap Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/486270/100/0/threaded" }, { "name": "1019182", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019182" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0247", "datePublished": "2008-01-12T02:00:00", "dateReserved": "2008-01-11T00:00:00", "dateUpdated": "2024-08-07T07:39:34.977Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-1521
Vulnerability from cvelistv5
Published
2009-05-05 17:00
Modified
2024-08-07 05:13
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the Java GUI in the IBM Tivoli Storage Manager (TSM) client 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.5, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17, and the TSM Express client 5.3.3.0 through 5.3.6.5, allows attackers to read or modify arbitrary files via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg21384389 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/50329 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2009/1235 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/32604 | third-party-advisory, x_refsource_SECUNIA | |
http://www-1.ibm.com/support/docview.wss?uid=swg1IC59779 | vendor-advisory, x_refsource_AIXAPAR |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:13:25.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389" }, { "name": "ibm-tsm-javagui-security-bypass(50329)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50329" }, { "name": "ADV-2009-1235", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1235" }, { "name": "32604", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32604" }, { "name": "IC59779", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC59779" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Java GUI in the IBM Tivoli Storage Manager (TSM) client 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.5, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17, and the TSM Express client 5.3.3.0 through 5.3.6.5, allows attackers to read or modify arbitrary files via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389" }, { "name": "ibm-tsm-javagui-security-bypass(50329)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50329" }, { "name": "ADV-2009-1235", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1235" }, { "name": "32604", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32604" }, { "name": "IC59779", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC59779" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1521", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Java GUI in the IBM Tivoli Storage Manager (TSM) client 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.5, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17, and the TSM Express client 5.3.3.0 through 5.3.6.5, allows attackers to read or modify arbitrary files via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389" }, { "name": "ibm-tsm-javagui-security-bypass(50329)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50329" }, { "name": "ADV-2009-1235", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1235" }, { "name": "32604", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32604" }, { "name": "IC59779", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC59779" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1521", "datePublished": "2009-05-05T17:00:00", "dateReserved": "2009-05-05T00:00:00", "dateUpdated": "2024-08-07T05:13:25.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-4801
Vulnerability from cvelistv5
Published
2008-10-30 22:00
Modified
2024-08-07 10:31
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in the Data Protection for SQL CAD service (aka dsmcat.exe) in the Client Acceptor Daemon (CAD) and the scheduler in the Backup-Archive client 5.1.0.0 through 5.1.8.1, 5.2.0.0 through 5.2.5.2, 5.3.0.0 through 5.3.6.1, 5.4.0.0 through 5.4.2.2, and 5.5.0.0 through 5.5.0.91 in IBM Tivoli Storage Manager (TSM); and the Backup-Archive client in TSM Express; allows remote attackers to execute arbitrary code by sending a large amount of crafted data to a TCP port.
References
▼ | URL | Tags |
---|---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg21322623 | x_refsource_CONFIRM | |
http://secunia.com/advisories/32465 | third-party-advisory, x_refsource_SECUNIA | |
http://www-1.ibm.com/support/docview.wss?uid=swg1IC56773 | vendor-advisory, x_refsource_AIXAPAR | |
http://www.securityfocus.com/archive/1/497950/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.securitytracker.com/id?1021122 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2008/2969 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/bid/31988 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46208 | vdb-entry, x_refsource_XF | |
http://www.zerodayinitiative.com/advisories/ZDI-08-071/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:31:27.360Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21322623" }, { "name": "32465", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32465" }, { "name": "IC56773", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC56773" }, { "name": "20081030 ZDI-08-071: IBM Tivoli Storage Manager Express for Microsoft SQL Heap Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/497950/100/0/threaded" }, { "name": "1021122", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021122" }, { "name": "ADV-2008-2969", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2969" }, { "name": "31988", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31988" }, { "name": "ibm-tsm-backuparchiveclient-bo(46208)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46208" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-071/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-10-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the Data Protection for SQL CAD service (aka dsmcat.exe) in the Client Acceptor Daemon (CAD) and the scheduler in the Backup-Archive client 5.1.0.0 through 5.1.8.1, 5.2.0.0 through 5.2.5.2, 5.3.0.0 through 5.3.6.1, 5.4.0.0 through 5.4.2.2, and 5.5.0.0 through 5.5.0.91 in IBM Tivoli Storage Manager (TSM); and the Backup-Archive client in TSM Express; allows remote attackers to execute arbitrary code by sending a large amount of crafted data to a TCP port." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21322623" }, { "name": "32465", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32465" }, { "name": "IC56773", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC56773" }, { "name": "20081030 ZDI-08-071: IBM Tivoli Storage Manager Express for Microsoft SQL Heap Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/497950/100/0/threaded" }, { "name": "1021122", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021122" }, { "name": "ADV-2008-2969", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2969" }, { "name": "31988", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31988" }, { "name": "ibm-tsm-backuparchiveclient-bo(46208)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46208" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-071/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-4801", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the Data Protection for SQL CAD service (aka dsmcat.exe) in the Client Acceptor Daemon (CAD) and the scheduler in the Backup-Archive client 5.1.0.0 through 5.1.8.1, 5.2.0.0 through 5.2.5.2, 5.3.0.0 through 5.3.6.1, 5.4.0.0 through 5.4.2.2, and 5.5.0.0 through 5.5.0.91 in IBM Tivoli Storage Manager (TSM); and the Backup-Archive client in TSM Express; allows remote attackers to execute arbitrary code by sending a large amount of crafted data to a TCP port." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21322623", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21322623" }, { "name": "32465", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32465" }, { "name": "IC56773", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC56773" }, { "name": "20081030 ZDI-08-071: IBM Tivoli Storage Manager Express for Microsoft SQL Heap Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/497950/100/0/threaded" }, { "name": "1021122", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021122" }, { "name": "ADV-2008-2969", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2969" }, { "name": "31988", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31988" }, { "name": "ibm-tsm-backuparchiveclient-bo(46208)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46208" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-08-071/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-08-071/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-4801", "datePublished": "2008-10-30T22:00:00", "dateReserved": "2008-10-30T00:00:00", "dateUpdated": "2024-08-07T10:31:27.360Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-1520
Vulnerability from cvelistv5
Published
2009-05-05 17:00
Modified
2024-08-07 05:13
Severity ?
EPSS score ?
Summary
Buffer overflow in the Web GUI in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17 allows attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/50328 | vdb-entry, x_refsource_XF | |
http://www-01.ibm.com/support/docview.wss?uid=swg21384389 | x_refsource_CONFIRM | |
http://www-1.ibm.com/support/docview.wss?uid=swg1IC59994 | vendor-advisory, x_refsource_AIXAPAR | |
http://www.vupen.com/english/advisories/2009/1235 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/32604 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:13:25.636Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ibm-tsm-webgui-bo(50328)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50328" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389" }, { "name": "IC59994", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC59994" }, { "name": "ADV-2009-1235", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1235" }, { "name": "32604", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32604" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-04-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Web GUI in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17 allows attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ibm-tsm-webgui-bo(50328)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50328" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389" }, { "name": "IC59994", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC59994" }, { "name": "ADV-2009-1235", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1235" }, { "name": "32604", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32604" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1520", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the Web GUI in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17 allows attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ibm-tsm-webgui-bo(50328)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50328" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389" }, { "name": "IC59994", "refsource": "AIXAPAR", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1IC59994" }, { "name": "ADV-2009-1235", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1235" }, { "name": "32604", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32604" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1520", "datePublished": "2009-05-05T17:00:00", "dateReserved": "2009-05-05T00:00:00", "dateUpdated": "2024-08-07T05:13:25.636Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }