5 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 17EXPL: 0

Unspecified vulnerability in the Java GUI in the IBM Tivoli Storage Manager (TSM) client 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.5, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17, and the TSM Express client 5.3.3.0 through 5.3.6.5, allows attackers to read or modify arbitrary files via unknown vectors. Vulnerabilidad inespecífica en Java GUI en el cliente IBM Tivoli Storage Manager (TSM) desde v5.2.0.0 hasta v5.2.5.3, desde v5.3.0.0 hasta v5.3.6.5, desde v5.4.0.0 hasta v5.4.2.6, y desde v5.5.0.0 hasta v5.5.1.17, y el cliente TSM Express desde v5.3.3.0 hasta v5.3.6.5, permite a atacantes remotos leer o modificar ficheros de forma arbitraria a través de vectores desconocidos. • http://secunia.com/advisories/32604 http://www-01.ibm.com/support/docview.wss?uid=swg21384389 http://www-1.ibm.com/support/docview.wss?uid=swg1IC59779 http://www.vupen.com/english/advisories/2009/1235 https://exchange.xforce.ibmcloud.com/vulnerabilities/50329 •

CVSS: 10.0EPSS: 1%CPEs: 19EXPL: 0

Buffer overflow in the Web GUI in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17 allows attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors. Desbordamiento de búfer en el interfaz gráfico de usuario Web en el cliente IBM Tivoli Storage Manager (TSM) desde v5.1.0.0 hasta v5.1.8.2, desde v5.2.0.0 hasta v5.2.5.3, desde v5.3.0.0 hasta v5.3.6.4, desde v5.4.0.0 hasta v5.4.2.6, y desde v5.5.0.0 hasta v5.5.1.17 permite a atacantes producir una denegación de servicio (caída de aplicación) o ejecutar código arbitrario a través de vectores inespecíficos. • http://secunia.com/advisories/32604 http://www-01.ibm.com/support/docview.wss?uid=swg21384389 http://www-1.ibm.com/support/docview.wss?uid=swg1IC59994 http://www.vupen.com/english/advisories/2009/1235 https://exchange.xforce.ibmcloud.com/vulnerabilities/50328 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 95%CPEs: 19EXPL: 1

Multiple stack-based buffer overflows in dsmagent.exe in the Remote Agent Service in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, and 5.4.0.0 through 5.4.1.96, and the TSM Express client 5.3.3.0 through 5.3.6.4, allow remote attackers to execute arbitrary code via (1) a request packet that is not properly parsed by an unspecified "generic string handling function" or (2) a crafted NodeName in a dicuGetIdentifyRequest request packet, related to the (a) Web GUI and (b) Java GUI. Múltiples desbordamientos de búfer basados en pila en dsmagent.exe en el agente de servicio remoto en el cliente IBM Tivoli Storage Manager (TSM) desde v5.1.0.0 hasta v5.1.8.2, desde v5.2.0.0 hasta 5.2.5.3, desde v5.3.0.0 hasta v5.3.6.4, y desde v5.4.0.0 hasta v5.4.1.96, y el cliente TSM Express desde v5.3.3.0 hasta v5.3.6.4, permite atacantes remotos ejecutar código de forma arbitraria a través de (1) una petición de paquete que no esta adecuadamente parseada mediante una "función genérica de manejo de cadena" inespecífica o (2) un "NodeName" manipulado en una petición de paquete "dicuGetIdentifyRequest", relacionado con (a) Interfaz gráfico de usuario y (b) interfaz gráfico de usuario Java. • https://www.exploit-db.com/exploits/16428 http://osvdb.org/54231 http://osvdb.org/54232 http://secunia.com/advisories/32604 http://secunia.com/secunia_research/2008-55 http://www-01.ibm.com/support/docview.wss?uid=swg21384389 http://www-1.ibm.com/support/docview.wss?uid=swg1IC59513 http://www.securityfocus.com/archive/1/503182/100/0/threaded http://www.vupen.com/english/advisories/2009/1235 https://exchange.xforce.ibmcloud.com/vulnerabilities/50327 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 82%CPEs: 21EXPL: 0

Heap-based buffer overflow in adsmdll.dll 5.3.7.7296, as used by the daemon (dsmsvc.exe) in the backup server in IBM Tivoli Storage Manager (TSM) Express 5.3.7.3 and earlier and TSM 5.2, 5.3 before 5.3.6.0, and 5.4.0.0 through 5.4.4.0, allows remote attackers to execute arbitrary code via a crafted length value. Un desbordamiento del búfer en la región heap de la memoria en la biblioteca adsmdll.dll versión 5.3.7.7296, como es usada por el demonio (dsmsvc.exe) en el servidor de respaldo en Tivoli Storage Manager (TSM) Express de IBM versión 5.3.7.3 y anteriores y TSM versión 5.2, versiones 5.3 anteriores a 5.3.6.0 , y versiones 5.4.0.0 hasta 5.4.4.0, permite a los atacantes remotos ejecutar código arbitrario por medio de un valor de longitud diseñado. • http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0192.html http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=775 http://osvdb.org/52617 http://secunia.com/advisories/34245 http://securitytracker.com/id?1021837 http://www-01.ibm.com/support/docview.wss?uid=swg21377388 http://www.securityfocus.com/bid/34077 http://www.vupen.com/english/advisories/2009/0669 https://exchange.xforce.ibmcloud.com/vulnerabilities/49188 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 49%CPEs: 1EXPL: 0

Heap-based buffer overflow in the Express Backup Server service (dsmsvc.exe) in IBM Tivoli Storage Manager (TSM) Express 5.3 before 5.3.7.3 allows remote attackers to execute arbitrary code via a packet with a large length value. Un desbordamiento de búfer en la región heap de la memoria en el servicio Express Backup Server (archivo dsmsvc.exe) en IBM Tivoli Storage Manager (TSM) Express versiones 5.3 anteriores a 5.3.7.3, permite a atacantes remotos ejecutar código arbitrario por medio de un paquete con un valor de longitud largo. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of IBM Tivoli Storage Manager Express. Authentication is not required to exploit this vulnerability. The specific flaw resides in the TSM Express Backup Server service, dsmsvc.exe, which listens by default on TCP port 1500. The process trusts a user-supplied length value. • http://secunia.com/advisories/28440 http://www-1.ibm.com/support/docview.wss?uid=swg21291536 http://www.securityfocus.com/archive/1/486270/100/0/threaded http://www.securityfocus.com/bid/27235 http://www.securitytracker.com/id?1019182 http://www.vupen.com/english/advisories/2008/0106 http://www.zerodayinitiative.com/advisories/ZDI-08-001.html https://exchange.xforce.ibmcloud.com/vulnerabilities/39604 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •