CVE-2009-0869
https://notcve.org/view.php?id=CVE-2009-0869
Buffer overflow in the client in IBM Tivoli Storage Manager (TSM) HSM 5.3.2.0 through 5.3.5.0, 5.4.0.0 through 5.4.2.5, and 5.5.0.0 through 5.5.1.4 on Windows allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors. Desbordamiento de búfer en el cliente en IBM Tivoli Storage Manager (TSM) HSM desde v5.3.2.0 hasta v5.3.5.0, desde v5.4.0.0 hasta v5.4.2.5, v5.5.0.0 hasta v5.5.1.4 en Windows permite a atacantes remotos producir una denegación de servicio (caída de la aplicación) o posiblemente ejecución arbitraria de código a través de vectores sin especificar. • http://secunia.com/advisories/34189 http://securitytracker.com/id?1021820 http://www-01.ibm.com/support/docview.wss?uid=swg21329223 http://www-1.ibm.com/support/docview.wss?uid=swg1IC59481 http://www.securityfocus.com/bid/34034 http://www.vupen.com/english/advisories/2009/0638 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-4801 – IBM Tivoli Storage Manager Express for Microsoft SQL Heap Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2008-4801
Heap-based buffer overflow in the Data Protection for SQL CAD service (aka dsmcat.exe) in the Client Acceptor Daemon (CAD) and the scheduler in the Backup-Archive client 5.1.0.0 through 5.1.8.1, 5.2.0.0 through 5.2.5.2, 5.3.0.0 through 5.3.6.1, 5.4.0.0 through 5.4.2.2, and 5.5.0.0 through 5.5.0.91 in IBM Tivoli Storage Manager (TSM); and the Backup-Archive client in TSM Express; allows remote attackers to execute arbitrary code by sending a large amount of crafted data to a TCP port. Desbordamiento de búfer basado en montículo en la Protección de Datos para el servicio SQL CAD (también conocido como dsmcat.exe) en Client Acceptor Daemon (CAD Demonio Aceptador de Clientes) y el programador en el cliente de archivos de respaldo de v5.1.0.0 a v5.1.8.1, de v5.2.0.0 a v5.2.5.2, de v5.3.0.0 a v5.3.6.1, de v5.4.0.0 a v5.4.2.2 y de v5.5.0.0 a v5.5.0.91 en Tivoli Storage Manager (TSM)de IBM; y el cliente de archivos de respaldo en TSM Express; permite a atacantes remotos ejecutar código de su elección enviando una gran cantidad de datos manipulados a un puerto TCP. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of IBM Tivoli Storage Manager Express for Microsoft SQL. Authentication is not required to exploit this vulnerability. The specific flaw resides in the Data Protection for SQL CAD service, dsmcat.exe, which listens by default on a TCP port above 1024. The process trusts a user-supplied size value, receiving the specified amount of data into a static heap buffer. • http://secunia.com/advisories/32465 http://www-01.ibm.com/support/docview.wss?uid=swg21322623 http://www-1.ibm.com/support/docview.wss?uid=swg1IC56773 http://www.securityfocus.com/archive/1/497950/100/0/threaded http://www.securityfocus.com/bid/31988 http://www.securitytracker.com/id?1021122 http://www.vupen.com/english/advisories/2008/2969 http://www.zerodayinitiative.com/advisories/ZDI-08-071 https://exchange.xforce.ibmcloud.com/vulnerabilities/46208 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-0247 – IBM Tivoli Storage Manager Express Backup Server Heap Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2008-0247
Heap-based buffer overflow in the Express Backup Server service (dsmsvc.exe) in IBM Tivoli Storage Manager (TSM) Express 5.3 before 5.3.7.3 allows remote attackers to execute arbitrary code via a packet with a large length value. Un desbordamiento de búfer en la región heap de la memoria en el servicio Express Backup Server (archivo dsmsvc.exe) en IBM Tivoli Storage Manager (TSM) Express versiones 5.3 anteriores a 5.3.7.3, permite a atacantes remotos ejecutar código arbitrario por medio de un paquete con un valor de longitud largo. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of IBM Tivoli Storage Manager Express. Authentication is not required to exploit this vulnerability. The specific flaw resides in the TSM Express Backup Server service, dsmsvc.exe, which listens by default on TCP port 1500. The process trusts a user-supplied length value. • http://secunia.com/advisories/28440 http://www-1.ibm.com/support/docview.wss?uid=swg21291536 http://www.securityfocus.com/archive/1/486270/100/0/threaded http://www.securityfocus.com/bid/27235 http://www.securitytracker.com/id?1019182 http://www.vupen.com/english/advisories/2008/0106 http://www.zerodayinitiative.com/advisories/ZDI-08-001.html https://exchange.xforce.ibmcloud.com/vulnerabilities/39604 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-4348
https://notcve.org/view.php?id=CVE-2007-4348
Cross-site scripting (XSS) vulnerability in the CAD service in IBM Tivoli Storage Manager (TSM) Client 5.3.5.3 and 5.4.1.2 for Windows allows remote attackers to inject arbitrary web script or HTML via HTTP requests to port 1581, which generate log entries in a dsmerror.log file that is accessible through a certain web interface. Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el servicio CAD de IBM Tivoli Storage Manager (TSM) Client 5.3.5.3 y 5.4.1.2 para Windows permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante peticiones HTTP al puerto 1581, lo cual genera entradas de registro en el fichero dsmerror.log, el cual es accesible a través de cierta inferfaz web. • http://secunia.com/advisories/27013 http://secunia.com/secunia_research/2007-75/advisory http://www.securityfocus.com/bid/26221 http://www.securitytracker.com/id?1018868 http://www.vupen.com/english/advisories/2007/3635 https://exchange.xforce.ibmcloud.com/vulnerabilities/38125 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2007-4880 – IBM Tivoli Storage Manager Express CAD Service Buffer Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2007-4880
Buffer overflow in the Client Acceptor Daemon (CAD), dsmcad.exe, in certain IBM Tivoli Storage Manager (TSM) clients 5.1 before 5.1.8.1, 5.2 before 5.2.5.2, 5.3 before 5.3.5.3, and 5.4 before 5.4.1.2 allows remote attackers to execute arbitrary code via crafted HTTP headers, aka IC52905. Desbordamiento de búfer en el Demonio Aceptador de Clientes (Client Acceptor Daemon o CAD), dsmcad.exe, en determinados clientes IBM Tivoli Storage Manager (TSM) 5.1 anterior a 5.1.8.1, 5.2 anterior a 5.2.5.2, 5.3 anterior a 5.3.5.3, y 5.4 anterior a 5.4.1.2 permite a atacantes remotos ejecutar código de su elección mediante cabeceras HTTP manipuladas, también conocida como IC52905. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Tivoli Storage Manager Express. Authentication is not required to exploit this vulnerability. The specific flaw exists in the dsmcad.exe process bound by default on TCP port 1581. During HTTP header parsing, a host parameter of sufficient length will trigger an overflow through a call to vswprintf(). • https://www.exploit-db.com/exploits/16764 https://www.exploit-db.com/exploits/4573 http://osvdb.org/38161 http://secunia.com/advisories/26883 http://securityreason.com/securityalert/3184 http://www-1.ibm.com/support/docview.wss?uid=swg21268775 http://www-1.ibm.com/support/search.wss?rs=0&q=IC52905&apar=only http://www.securityfocus.com/archive/1/480492 http://www.securityfocus.com/bid/25743 http://www.securitytracker.com/id?1018725 http://www.vupen.com/english/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •