CERTA-2009-AVI-178

Vulnerability from certfr_avis - Published: - Updated:

Plusieurs vulnérabilités de Tivoli Storage Manager permettent à un individu malintentionné de contourner la politique de sécurité et de réaliser un déni de service.

Description

De multiples vulnérabilités affectent le client de Tivoli Storage Manager (ou TSM) :

  • plusieurs vulnérabilités affectent les interfaces graphiques des clients (Web et Java) et permettent à un individu malveillant d'avoir accès au système de fichiers de la machine disposant du client TSM ;
  • une vulnérabilité de type homme au milieu (ou man in the middle) affectent les versions du client TSM fonctionnant sous AIX et Windows. Cette vulnérabilité permet à un individu malintentionné de contourner la politique de sécurité de la machine ;
  • la dernière vulnérabilité concerne Tivoli Storage Manager Agent Client : un individu distant peut réaliser un déni de service au moyen d'un paquet construit de façon malveillante.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
IBM Tivoli Tivoli Storage Manager Express client versions antérieures à 5.3.6.6.
IBM Tivoli Tivoli Storage Manager 5.3 client versions antérieures à 5.3.6.6 ;
IBM Tivoli Tivoli Storage Manager 5.1 client versions antérieures à 5.1.8.3 ;
IBM Tivoli Tivoli Storage Manager 5.4 client versions antérieures à 5.4.2 ;
IBM Tivoli Tivoli Storage Manager 5.2 client versions antérieures à 5.2.5.4 ;
IBM Tivoli Tivoli Storage Manager 5.5 client versions antérieures à 5.5.2 ;
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Tivoli Storage Manager Express client versions ant\u00e9rieures \u00e0 5.3.6.6.",
      "product": {
        "name": "Tivoli",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Tivoli Storage Manager 5.3 client versions ant\u00e9rieures \u00e0 5.3.6.6 ;",
      "product": {
        "name": "Tivoli",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Tivoli Storage Manager 5.1 client versions ant\u00e9rieures \u00e0 5.1.8.3 ;",
      "product": {
        "name": "Tivoli",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Tivoli Storage Manager 5.4 client versions ant\u00e9rieures \u00e0 5.4.2 ;",
      "product": {
        "name": "Tivoli",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Tivoli Storage Manager 5.2 client versions ant\u00e9rieures \u00e0 5.2.5.4 ;",
      "product": {
        "name": "Tivoli",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    },
    {
      "description": "Tivoli Storage Manager 5.5 client versions ant\u00e9rieures \u00e0 5.5.2 ;",
      "product": {
        "name": "Tivoli",
        "vendor": {
          "name": "IBM",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s affectent le client de Tivoli Storage\nManager (ou TSM) :\n\n-   plusieurs vuln\u00e9rabilit\u00e9s affectent les interfaces graphiques des\n    clients (Web et Java) et permettent \u00e0 un individu malveillant\n    d\u0027avoir acc\u00e8s au syst\u00e8me de fichiers de la machine disposant du\n    client TSM ;\n-   une vuln\u00e9rabilit\u00e9 de type homme au milieu (ou man in the middle)\n    affectent les versions du client TSM fonctionnant sous AIX et\n    Windows. Cette vuln\u00e9rabilit\u00e9 permet \u00e0 un individu malintentionn\u00e9 de\n    contourner la politique de s\u00e9curit\u00e9 de la machine ;\n-   la derni\u00e8re vuln\u00e9rabilit\u00e9 concerne Tivoli Storage Manager Agent\n    Client : un individu distant peut r\u00e9aliser un d\u00e9ni de service au\n    moyen d\u0027un paquet construit de fa\u00e7on malveillante.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2008-4828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-4828"
    }
  ],
  "links": [],
  "reference": "CERTA-2009-AVI-178",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2009-05-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s de \u003cspan class=\"textit\"\u003eTivoli Storage\nManager\u003c/span\u003e permettent \u00e0 un individu malintentionn\u00e9 de contourner la\npolitique de s\u00e9curit\u00e9 et de r\u00e9aliser un d\u00e9ni de service.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s de Tivoli Storage Manager client",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 IBM swg21384389 du 30 avril 2009",
      "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21384389"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…