Page 3 of 22 results (0.019 seconds)

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 3

Stack-based buffer overflow in the GeneratePassword function in dsmtca (aka the Trusted Communications Agent or TCA) in the backup-archive client in IBM Tivoli Storage Manager (TSM) 5.3.x before 5.3.6.10, 5.4.x before 5.4.3.4, 5.5.x before 5.5.2.10, and 6.1.x before 6.1.3.1 on Unix and Linux allows local users to gain privileges by specifying a long LANG environment variable, and then sending a request over a pipe. Desbordamiento de búfer basado en pila en la función GeneratePassword en dsmtca (también conocido como el Trusted Communications Agent o TCA) en el cliente backup-archive en IBM Tivoli Storage Manager (TSM) v5.3.x anterior a v5.3.6.10, v5.4.x anterior a v5.4.3.4, v5.5.x anterior a v5.5.2.10, y v6.1.x anterior a v6.1.3.1 sobre Unix y Linux permite a usuarios locales obtener privilegios especificando una variable de entorno LANG de gran tamaño y posteriormente enviando una petición sobre una tubería (pipe). • https://www.exploit-db.com/exploits/15745 http://secunia.com/advisories/42639 http://securitytracker.com/id?1024901 http://www-01.ibm.com/support/docview.wss?uid=swg1IC65491 http://www.exploit-db.com/exploits/15745 http://www.ibm.com/support/docview.wss?uid=swg21454745 http://www.kryptoslogic.com/advisories/2010/kryptoslogic-ibm-tivoli-dsmtca-exploit.c http://www.kryptoslogic.com/advisories/2010/kryptoslogic-ibm-tivoli-dsmtca.txt http://www.securityfocus.com/archive/1/515263/100/0/t • CWE-787: Out-of-bounds Write •

CVSS: 6.6EPSS: 0%CPEs: 33EXPL: 0

Unspecified vulnerability in the backup-archive client in IBM Tivoli Storage Manager (TSM) 5.3.x before 5.3.6.10, 5.4.x before 5.4.3.4, 5.5.x before 5.5.3, 6.1.x before 6.1.4, and 6.2.x before 6.2.2 on Unix and Linux allows local users to overwrite arbitrary files via unknown vectors. Vulnerabilidad no especificada en el cliente de copia de seguridad de archivos en IBM Tivoli Storage Manager (TSM) v5.3.x anteriores a v5.3.6.10, v5.4.3.4 anterior a v5.4.x, v5.5.x anteriores a v5.5.3, v6.1.x anteriores a v6.1.4, y v6.2.x anteirores a v6.2.2 en Unix y Linux permite a usuarios locales sobrescribir archivos de su elección a través de vectores desconocidos. • http://secunia.com/advisories/42639 http://securitytracker.com/id?1024901 http://www-01.ibm.com/support/docview.wss?uid=swg1IC66686 http://www.ibm.com/support/docview.wss?uid=swg21454745 http://www.vupen.com/english/advisories/2010/3251 •

CVSS: 10.0EPSS: 12%CPEs: 18EXPL: 0

Buffer overflow in the traditional client scheduler in the client in IBM Tivoli Storage Manager (TSM) 5.3 before 5.3.6.7 and 5.4 before 5.4.2 allows remote attackers to execute arbitrary code via unspecified vectors. Desbordamiento de búfer en traditional client scheduler en the client en IBM Tivoli Storage Manager (TSM) v5.3 anteriores a v5.3.6.7 y v5.4 anteriores a v5.4.2 • http://secunia.com/advisories/32534 http://securitytracker.com/id?1023136 http://www-01.ibm.com/support/docview.wss?uid=swg1IC61058 http://www-01.ibm.com/support/docview.wss?uid=swg21405562 http://www.vupen.com/english/advisories/2009/3132 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 0%CPEs: 17EXPL: 0

Multiple unspecified vulnerabilities in the (1) UNIX and (2) Linux backup-archive clients, and the (3) OS/400 API client, in IBM Tivoli Storage Manager (TSM) 5.3 before 5.3.6.6, 5.4 before 5.4.2, and 5.5 before 5.5.1, when the MAILPROG option is enabled, allow attackers to read, modify, or delete arbitrary files via unknown vectors. Múltiples vulnerabilidades sin especificar en (1) UNIX y (2) clientes Linux backup-archive, y (3)el cliente API de OS/400, en IBM Tivoli Storage Manager (TSM) v5.3 anteriores a v5.3.6.6, v5.4 anteriores a v5.4.2, y v5.5 anteriores a v5.5.1, • http://secunia.com/advisories/32534 http://www-01.ibm.com/support/docview.wss?uid=swg1IC54489 http://www-01.ibm.com/support/docview.wss?uid=swg21405562 http://www.vupen.com/english/advisories/2009/3132 •

CVSS: 9.3EPSS: 95%CPEs: 27EXPL: 1

Stack-based buffer overflow in the client acceptor daemon (CAD) scheduler in the client in IBM Tivoli Storage Manager (TSM) 5.3 before 5.3.6.7, 5.4 before 5.4.3, 5.5 before 5.5.2.2, and 6.1 before 6.1.0.2, and TSM Express 5.3.3.0 through 5.3.6.6, allows remote attackers to execute arbitrary code via crafted data in a TCP packet. Un desbordamiento de búfer en la región stack de la memoria en el planificador del demonio de aceptación de cliente (CAD) en el cliente en Tivoli Storage Manager (TSM) versiones 5.3 anteriores a 5.3.6.7, versiones 5.4 anteriores a 5.4.3, versiones 5.5 anteriores a 5.5.2.2, y versiones 6.1 anteriores a 6.1.0.2, y TSM Express versiones 5.3.3.0 hasta 5.3.6.6, de IBM, permite a los atacantes remotos ejecutar código arbitrario por medio de datos especialmente diseñados en un paquete TCP. • https://www.exploit-db.com/exploits/16421 http://secunia.com/advisories/32534 http://secunia.com/secunia_research/2008-51 http://securitytracker.com/id?1023136 http://www-01.ibm.com/support/docview.wss?uid=swg1IC61036 http://www-01.ibm.com/support/docview.wss?uid=swg21405562 http://www.securityfocus.com/archive/1/507654/100/0/threaded http://www.vupen.com/english/advisories/2009/3132 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •