Page 4 of 21 results (0.002 seconds)

CVSS: 4.3EPSS: 1%CPEs: 18EXPL: 0

The server in IBM Tivoli Storage Manager (TSM) 4.2.x on MVS, 5.1.9.x before 5.1.9.1, 5.1.x before 5.1.10, 5.2.2.x before 5.2.2.3, 5.2.x before 5.2.3, 5.3.x before 5.3.0, and 6.x before 6.1, when the HTTP communication method is enabled, allows remote attackers to cause a denial of service (daemon crash or hang) via unspecified HTTP traffic, as demonstrated by the IBM port scanner 1.3.1. El servidor en IBM Tivoli Storage Manager (TSM) 4.2.x en MVS, 5.1.9.x versiones anteriores a v5.1.9.1, 5.1.x versiones anteriores a v5.1.10, 5.2.2.x versiones anteriores a v5.2.2.3, 5.2.x versiones anteriores a v5.2.3, 5.3.x versiones anteriores a v5.3.0, y 6.x versiones anteriores a v6.1, cuando el método de comunicación HTTP está activo, permite a atacantes remotos provocar una denegación de servicio (caída del demonio o cuelgue) a través de tráfico HTTP sin especificar, como lo demostrador por el escáner de puertos de IBM v1.3.1. • http://secunia.com/advisories/34498 http://securitytracker.com/id?1021946 http://www-01.ibm.com/support/docview.wss?uid=swg21246076 http://www-01.ibm.com/support/docview.wss?uid=swg21375360 http://www-1.ibm.com/support/docview.wss?uid=swg1IC39395 http://www.securityfocus.com/bid/34285 http://www.vupen.com/english/advisories/2009/0881 https://exchange.xforce.ibmcloud.com/vulnerabilities/49535 •

CVSS: 10.0EPSS: 82%CPEs: 21EXPL: 0

Heap-based buffer overflow in adsmdll.dll 5.3.7.7296, as used by the daemon (dsmsvc.exe) in the backup server in IBM Tivoli Storage Manager (TSM) Express 5.3.7.3 and earlier and TSM 5.2, 5.3 before 5.3.6.0, and 5.4.0.0 through 5.4.4.0, allows remote attackers to execute arbitrary code via a crafted length value. Un desbordamiento del búfer en la región heap de la memoria en la biblioteca adsmdll.dll versión 5.3.7.7296, como es usada por el demonio (dsmsvc.exe) en el servidor de respaldo en Tivoli Storage Manager (TSM) Express de IBM versión 5.3.7.3 y anteriores y TSM versión 5.2, versiones 5.3 anteriores a 5.3.6.0 , y versiones 5.4.0.0 hasta 5.4.4.0, permite a los atacantes remotos ejecutar código arbitrario por medio de un valor de longitud diseñado. • http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0192.html http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=775 http://osvdb.org/52617 http://secunia.com/advisories/34245 http://securitytracker.com/id?1021837 http://www-01.ibm.com/support/docview.wss?uid=swg21377388 http://www.securityfocus.com/bid/34077 http://www.vupen.com/english/advisories/2009/0669 https://exchange.xforce.ibmcloud.com/vulnerabilities/49188 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 5%CPEs: 5EXPL: 2

Multiple array index errors in IBM Tivoli Storage Manager (TSM) before 5.2.9 and 5.3.x before 5.3.4 allow remote attackers to read arbitrary memory locations and cause a denial of service (crash) via a large index value in unspecified messages, a different issue than CVE-2006-5855. Múltiples errores de índice de array en IBM Tivoli Storage Manager (TSM) anterior a 5.2.9 y 5.3.x anterior a 5.3.4 permite a atacantes remotos leer localizaciones arbitrarias de memoria y provocar una denegación de servicio (caída) mediante un valor de índice grande en mensajes no especificados, un asunto diferente que CVE-2006-5855. • http://securityreason.com/securityalert/1979 http://www-1.ibm.com/support/docview.wss?uid=swg21250261 http://www.securityfocus.com/archive/1/453544/100/0/threaded http://www.tippingpoint.com/security/advisories/TSRT-06-14.html •

CVSS: 10.0EPSS: 96%CPEs: 6EXPL: 0

Multiple buffer overflows in IBM Tivoli Storage Manager (TSM) before 5.2.9 and 5.3.x before 5.3.4 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in (1) the language field at logon that begins with a 0x18 byte, (2) two unspecified parameters to the SmExecuteWdsfSession function, and (3) the contact field in an open registration message. Múltiples desbordamientos de búfer en IBM Tivoli Storage Manager (TSM) anterior a 5.2.9 y 5.3.x anterior a 5.3.4 permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código de su elección mediante mediante una cadena larga en (1) el campo language al comenzar la sesión que empieza con un byte 0x18, (2) dos parámetros no especificados a la función SmExecuteWdsfSession , y (3) el campo contact en un mensaje de registro abierto. • http://secunia.com/advisories/23177 http://securityreason.com/securityalert/1979 http://securitytracker.com/id?1017333 http://www-1.ibm.com/support/docview.wss?uid=swg1IC50347 http://www-1.ibm.com/support/docview.wss?uid=swg21250261 http://www.kb.cert.org/vuls/id/350625 http://www.kb.cert.org/vuls/id/478753 http://www.kb.cert.org/vuls/id/887249 http://www.securityfocus.com/archive/1/453544/100/0/threaded http://www.securityfocus.com/bid/21440 http://www •

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 0

Unknown vulnerability in VERITAS Bare Metal Restore (BMR) of Tivoli Storage Manager (TSM) 3.1.0 through 3.2.1 allows remote attackers to gain root privileges on the BMR Main Server. • http://archives.neohapsis.com/archives/bugtraq/2003-02/0333.html http://seer.support.veritas.com/docs/252933.htm http://seer.support.veritas.com/docs/254442.htm http://www.securityfocus.com/bid/6928 https://exchange.xforce.ibmcloud.com/vulnerabilities/11418 •