VAR-201502-0228

Vulnerability from variot - Updated: 2023-12-18 12:30

Stack-based buffer overflow in dsmtca in the client in IBM Tivoli Storage Manager (TSM) 5.4 through 5.4.3.6, 5.5 through 5.5.4.3, 6.1 through 6.1.5.6, 6.2 before 6.2.5.4, and 6.3 before 6.3.2.3 on UNIX, Linux, and OS X allows local users to gain privileges via unspecified vectors. Successful exploits may allow attackers to execute arbitrary code in the context of the application with root privileges. Failed exploits may result in denial-of-service conditions. IBM Tivoli Storage Manager (TSM) is a set of backup and recovery management solutions of IBM Corporation in the United States. The solution supports data protection, space management and archiving, business recovery and disaster recovery, etc. The dsmtca program in the IBM TSM client has a stack-based buffer overflow vulnerability. A local attacker could exploit this vulnerability to gain privileges. The following versions are affected: IBM TSM versions 5.4 through 5.4.3.6, 5.5 through 5.5.4.3, 6.1 through 6.1.5.6, 6.2.0.0 through 6.2.5.3 on UNIX, Linux and OS X platforms, Version 6.3.0.0 to version 6.3.2.2

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201502-0228",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "tivoli storage manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.2.0"
      },
      {
        "model": "tivoli storage manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.3.0"
      },
      {
        "model": "tivoli storage manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.1.0"
      },
      {
        "model": "tivoli storage manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.1.5.6"
      },
      {
        "model": "tivoli storage manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "5.5.4.3"
      },
      {
        "model": "tivoli storage manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "5.5.0"
      },
      {
        "model": "tivoli storage manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "5.4.3.6"
      },
      {
        "model": "tivoli storage manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.2.5.3"
      },
      {
        "model": "tivoli storage manager",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "5.4.0"
      },
      {
        "model": "tivoli storage manager",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "ibm",
        "version": "6.3.2.2"
      },
      {
        "model": "spectrum protect",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "5.5 to  5.5.4.3"
      },
      {
        "model": "spectrum protect",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "6.3"
      },
      {
        "model": "spectrum protect",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "6.2"
      },
      {
        "model": "spectrum protect",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "6.3.2.3"
      },
      {
        "model": "spectrum protect",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "5.4 to  5.4.3.6"
      },
      {
        "model": "spectrum protect",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "6.2.5.4"
      },
      {
        "model": "spectrum protect",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "6.1 to  6.1.5.6"
      },
      {
        "model": "tivoli storage manager",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ibm",
        "version": "6.1"
      },
      {
        "model": "tivoli storage manager",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ibm",
        "version": "5.4"
      },
      {
        "model": "tivoli storage manager",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ibm",
        "version": "5.5"
      },
      {
        "model": "tivoli storage manager",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ibm",
        "version": "6.3"
      },
      {
        "model": "tivoli storage manager",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "ibm",
        "version": "6.2"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.4"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.5.3"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.2.2"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.1.0"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.3.0.0"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.5.3"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.5.0"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.4.0"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.1.1"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.1.0"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.2.0.0"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.5.6"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.5.0"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.3.4"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.3.0"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "6.1.0.0"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.5.4.3"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.5.4.0"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.5.2.7"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.5.2.12"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.5.0.0"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.4.3.6"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.4.3.4"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.4.3.3"
      },
      {
        "model": "tivoli storage manager client",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.4.0.0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "74320"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007936"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-6184"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-377"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:ibm:tivoli_storage_manager:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "5.4.3.6",
                    "versionStartIncluding": "5.4.0",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:ibm:tivoli_storage_manager:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "5.5.4.3",
                    "versionStartIncluding": "5.5.0",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:ibm:tivoli_storage_manager:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "6.1.5.6",
                    "versionStartIncluding": "6.1.0",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:ibm:tivoli_storage_manager:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "6.2.5.3",
                    "versionStartIncluding": "6.2.0",
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:ibm:tivoli_storage_manager:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "6.3.2.2",
                    "versionStartIncluding": "6.3.0",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-6184"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Matthias Kaiser from Daimler TSS GmbH",
    "sources": [
      {
        "db": "BID",
        "id": "74320"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-6184",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": true,
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Local",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 7.2,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2014-6184",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-74127",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2014-6184",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201502-377",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-74127",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-74127"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007936"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-6184"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-377"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Stack-based buffer overflow in dsmtca in the client in IBM Tivoli Storage Manager (TSM) 5.4 through 5.4.3.6, 5.5 through 5.5.4.3, 6.1 through 6.1.5.6, 6.2 before 6.2.5.4, and 6.3 before 6.3.2.3 on UNIX, Linux, and OS X allows local users to gain privileges via unspecified vectors. \nSuccessful exploits may allow attackers to execute arbitrary code in the  context of the application with root privileges. Failed exploits may  result in denial-of-service conditions. IBM Tivoli Storage Manager (TSM) is a set of backup and recovery management solutions of IBM Corporation in the United States. The solution supports data protection, space management and archiving, business recovery and disaster recovery, etc. The dsmtca program in the IBM TSM client has a stack-based buffer overflow vulnerability. A local attacker could exploit this vulnerability to gain privileges. The following versions are affected: IBM TSM versions 5.4 through 5.4.3.6, 5.5 through 5.5.4.3, 6.1 through 6.1.5.6, 6.2.0.0 through 6.2.5.3 on UNIX, Linux and OS X platforms, Version 6.3.0.0 to version 6.3.2.2",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-6184"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007936"
      },
      {
        "db": "BID",
        "id": "74320"
      },
      {
        "db": "VULHUB",
        "id": "VHN-74127"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-6184",
        "trust": 2.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007936",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-377",
        "trust": 0.7
      },
      {
        "db": "BID",
        "id": "74320",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-74127",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-74127"
      },
      {
        "db": "BID",
        "id": "74320"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007936"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-6184"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-377"
      }
    ]
  },
  "id": "VAR-201502-0228",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-74127"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:30:27.237000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "1695878",
        "trust": 0.8,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695878"
      },
      {
        "title": "6.3.2.3-TIV-TSMBAC-LinuxX86",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54036"
      },
      {
        "title": "6.2.5.4-TIV-TSMBAC-Mac",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54035"
      },
      {
        "title": "6.2.5.4-TIV-TSMBAC-LinuxX86",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54034"
      },
      {
        "title": "6.3.2.3-TIV-TSMBAC-Mac",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54037"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007936"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-377"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-787",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-119",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-74127"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007936"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-6184"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21695878"
      },
      {
        "trust": 1.7,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1it05707"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-6184"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6184"
      },
      {
        "trust": 0.3,
        "url": "http://www.ibm.com"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-74127"
      },
      {
        "db": "BID",
        "id": "74320"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007936"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-6184"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-377"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-74127"
      },
      {
        "db": "BID",
        "id": "74320"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007936"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-6184"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-377"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-02-22T00:00:00",
        "db": "VULHUB",
        "id": "VHN-74127"
      },
      {
        "date": "2015-04-24T00:00:00",
        "db": "BID",
        "id": "74320"
      },
      {
        "date": "2015-02-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-007936"
      },
      {
        "date": "2015-02-22T02:59:00.060000",
        "db": "NVD",
        "id": "CVE-2014-6184"
      },
      {
        "date": "2015-02-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201502-377"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2020-09-25T00:00:00",
        "db": "VULHUB",
        "id": "VHN-74127"
      },
      {
        "date": "2015-04-24T00:00:00",
        "db": "BID",
        "id": "74320"
      },
      {
        "date": "2015-02-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-007936"
      },
      {
        "date": "2021-09-08T17:19:30.890000",
        "db": "NVD",
        "id": "CVE-2014-6184"
      },
      {
        "date": "2020-09-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201502-377"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "74320"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-377"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  OS Run on  IBM Tivoli Storage Manager Client\u0027s  dsmtca Vulnerable to stack-based buffer overflow",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-007936"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-377"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…