CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
99.3%
Multiple stack-based buffer overflows in dsmagent.exe in the Remote Agent Service in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, and 5.4.0.0 through 5.4.1.96, and the TSM Express client 5.3.3.0 through 5.3.6.4, allow remote attackers to execute arbitrary code via (1) a request packet that is not properly parsed by an unspecified “generic string handling function” or (2) a crafted NodeName in a dicuGetIdentifyRequest request packet, related to the (a) Web GUI and (b) Java GUI.
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | tivoli_storage_manager_client | 5.1 | cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager_client | 5.1.8.0 | cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1.8.0:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager_client | 5.1.8.2 | cpe:2.3:a:ibm:tivoli_storage_manager_client:5.1.8.2:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager_client | 5.2 | cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager_client | 5.2.5.1 | cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.1:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager_client | 5.2.5.2 | cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.2:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager_client | 5.2.5.3 | cpe:2.3:a:ibm:tivoli_storage_manager_client:5.2.5.3:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager_client | 5.3 | cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager_client | 5.3.5.2 | cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.5.2:*:*:*:*:*:*:* |
ibm | tivoli_storage_manager_client | 5.3.5.3 | cpe:2.3:a:ibm:tivoli_storage_manager_client:5.3.5.3:*:*:*:*:*:*:* |
osvdb.org/54231
osvdb.org/54232
secunia.com/advisories/32604
secunia.com/secunia_research/2008-55/
www-01.ibm.com/support/docview.wss?uid=swg21384389
www-1.ibm.com/support/docview.wss?uid=swg1IC59513
www.securityfocus.com/archive/1/503182/100/0/threaded
www.vupen.com/english/advisories/2009/1235
exchange.xforce.ibmcloud.com/vulnerabilities/50327