Page 12 of 69 results (0.011 seconds)

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 0

Unspecified vulnerability in the Space Management client in the Hierarchical Storage Management (HSM) component in IBM Tivoli Storage Manager (TSM) 5.4.x before 5.4.3.4, 5.5.x before 5.5.3, 6.1.x before 6.1.4, and 6.2.x before 6.2.2 on Unix and Linux allows remote attackers to execute arbitrary commands via unknown vectors, related to a "script execution vulnerability." Vulnerabilidad sin especificar en el cliente Space Management en el Hierarchical Storage Management (HSM) component en IBM Tivoli Storage Manager (TSM) v 5.4.x anterior a v5.4.3.4, v5.5.x anterior a v5.5.3, v6.1.x anterior a v6.1.4, y v6.2.x anterior a v6.2.2 sobre Unix y Linux, permite a atacantes remotos ejecutar comandos de su elección a través de vectores no especificados. Relacionado con una "vulnerabilidad de ejecución de secuencias de comandos". • http://secunia.com/advisories/42639 http://securitytracker.com/id?1024901 http://www-01.ibm.com/support/docview.wss?uid=swg1IC69150 http://www.ibm.com/support/docview.wss?uid=swg21454745 http://www.vupen.com/english/advisories/2010/3251 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 3

Stack-based buffer overflow in the GeneratePassword function in dsmtca (aka the Trusted Communications Agent or TCA) in the backup-archive client in IBM Tivoli Storage Manager (TSM) 5.3.x before 5.3.6.10, 5.4.x before 5.4.3.4, 5.5.x before 5.5.2.10, and 6.1.x before 6.1.3.1 on Unix and Linux allows local users to gain privileges by specifying a long LANG environment variable, and then sending a request over a pipe. Desbordamiento de búfer basado en pila en la función GeneratePassword en dsmtca (también conocido como el Trusted Communications Agent o TCA) en el cliente backup-archive en IBM Tivoli Storage Manager (TSM) v5.3.x anterior a v5.3.6.10, v5.4.x anterior a v5.4.3.4, v5.5.x anterior a v5.5.2.10, y v6.1.x anterior a v6.1.3.1 sobre Unix y Linux permite a usuarios locales obtener privilegios especificando una variable de entorno LANG de gran tamaño y posteriormente enviando una petición sobre una tubería (pipe). • https://www.exploit-db.com/exploits/15745 http://secunia.com/advisories/42639 http://securitytracker.com/id?1024901 http://www-01.ibm.com/support/docview.wss?uid=swg1IC65491 http://www.exploit-db.com/exploits/15745 http://www.ibm.com/support/docview.wss?uid=swg21454745 http://www.kryptoslogic.com/advisories/2010/kryptoslogic-ibm-tivoli-dsmtca-exploit.c http://www.kryptoslogic.com/advisories/2010/kryptoslogic-ibm-tivoli-dsmtca.txt http://www.securityfocus.com/archive/1/515263/100/0/t • CWE-787: Out-of-bounds Write •

CVSS: 5.0EPSS: 0%CPEs: 10EXPL: 0

The _DAS_ReadBlockReply function in FastBackServer.exe in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.5.0.0 through 5.5.6.0 and 6.1.0.0 through 6.1.0.1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via data in a TCP packet. NOTE: this might overlap CVE-2010-3060. La función _DAS_ReadBlockReply en FastBackServer.exe en el servidor de IBM Tivoli Storage Manager (TSM) Fastback v5.5.0.0 a v5.5.6.0 y v6.1.0.0 a v6.1.0.1 permite a atacantes remotos provocar una denegación de servicio (Mediante una desreferencia a puntero NULO y caída del demonio) a través del envío de datos en un paquete TCP. NOTA: esto puede superponerse a CVE-2010-3060. • http://www-01.ibm.com/support/docview.wss?uid=swg1IC69883 http://www.ibm.com/support/docview.wss?uid=swg21443820 http://www.securityfocus.com/archive/1/514063/100/0/threaded http://zerodayinitiative.com/advisories/ZDI-10-187 • CWE-399: Resource Management Errors •

CVSS: 10.0EPSS: 27%CPEs: 10EXPL: 0

Multiple stack-based buffer overflows in FastBackServer.exe in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.5.0.0 through 5.5.6.0 and 6.1.0.0 through 6.1.0.1 allow remote attackers to execute arbitrary code via vectors involving the (1) AGI_SendToLog (aka _SendToLog) function; the (2) group, (3) workgroup, or (4) domain name field to the USER_S_AddADGroup function; the (5) user_path variable to the FXCLI_checkIndexDBLocation function; or (6) the _AGI_S_ActivateLTScriptReply (aka ActivateLTScriptReply) function. NOTE: this might overlap CVE-2010-3059. Múltiples desbordamientos de búfer basados en pila en FastBackServer.exe en el servidor de IBM Tivoli Storage Manager (TSM) Fastback v5.5.0.0 a v5.5.6.0 y 6.1.0.0 a v6.1.0.1 permiten a atacantes remotos ejecutar código arbitrario a través de vectores que afectan a (1) la función AGI_SendToLog (también conocida como _SendToLog), los campos (2) group , (3) workgroup, y (4) domain name , a la función USER_S_AddADGroup, (5) la variable user_path a la función FXCLI_checkIndexDBLocation, o (6)a la función _AGI_S_ActivateLTScriptReply (también conocido como ActivateLTScriptReply). NOTA: esto puede superponerse CVE-2010-3059. • http://www-01.ibm.com/support/docview.wss?uid=swg1IC69883 http://www.ibm.com/support/docview.wss?uid=swg21443820 http://www.securityfocus.com/archive/1/514059/100/0/threaded http://www.securityfocus.com/archive/1/514067/100/0/threaded http://www.securityfocus.com/archive/1/514072/100/0/threaded http://www.securityfocus.com/archive/1/514078/100/0/threaded http://zerodayinitiative.com/advisories/ZDI-10-180 http://zerodayinitiative.com/advisories/ZDI-10-181 http://zerodayinitiativ • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 10.0EPSS: 1%CPEs: 10EXPL: 0

FastBackMount.exe in the Mount service in IBM Tivoli Storage Manager (TSM) FastBack 5.5.0.0 through 5.5.6.0 and 6.1.0.0 through 6.1.0.1 writes a certain value to a memory location specified by a UDP packet field, which allows remote attackers to execute arbitrary code via multiple requests. NOTE: this might overlap CVE-2010-3058. FastBackMount.exe en el servicio de montaje de IBM Tivoli Storage Manager (TSM) Fastback v5.5.0.0 a v5.5.6.0 y v6.1.0.0 a v6.1.0.1 escribe un valor a una posición de memoria indicada por un campo de un paquete UDP, lo que permite a atacantes remotos ejecutar código arbitrario a través de múltiples peticiones. NOTA: esto puede superponerse con CVE-2010-3058. • http://www-01.ibm.com/support/docview.wss?uid=swg1IC69883 http://www.ibm.com/support/docview.wss?uid=swg21443820 http://www.securityfocus.com/archive/1/514068/100/0/threaded http://zerodayinitiative.com/advisories/ZDI-10-179 • CWE-94: Improper Control of Generation of Code ('Code Injection') •