Page 4 of 42 results (0.013 seconds)

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 0

05 Oct 2010 — FastBackMount.exe in the Mount service in IBM Tivoli Storage Manager (TSM) FastBack 5.5.0.0 through 5.5.6.0 and 6.1.0.0 through 6.1.0.1 does not properly handle a certain failure to allocate memory, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash, and recovery failure) by specifying a large size value within TCP packet data. NOTE: this might overlap CVE-2010-3061. FastBackMount.exe en el servicio de montaje de IBM Tivoli Storage Manager (TSM) Fastback v5... • http://www-01.ibm.com/support/docview.wss?uid=swg1IC69883 • CWE-399: Resource Management Errors •

CVSS: 10.0EPSS: 9%CPEs: 10EXPL: 0

05 Oct 2010 — Unspecified vulnerability in IBM Tivoli Storage Manager (TSM) FastBack 5.5.0.0 through 5.5.6.0 and 6.1.0.0 through 6.1.0.1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-700. NOTE: this might overlap CVE-2010-3058 or CVE-2010-3059. Una vulnerabilidad no especificada en IBM Tivoli Storage Manager (TSM) Fastback v5.5.0.0 hasta v5.5.6.0 y v6.1.0.0 hasta v6.1.0.1 permite a atacantes remotos ejecutar código de su elección a través de vectores desconocidos. Este problema tambié... • http://www-01.ibm.com/support/docview.wss?uid=swg1IC69883 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.8EPSS: 2%CPEs: 9EXPL: 0

20 Aug 2010 — The Mount service in IBM Tivoli Storage Manager (TSM) FastBack 5.x.x before 5.5.7, and 6.1.0.0, establishes an open UDP port, which might allow remote attackers to overwrite memory locations and execute arbitrary code, or cause a denial of service (application hang), via unspecified vectors. El servicio Mount en IBM Tivoli Storage Manager (TSM) FastBack v5.x.x anterior a v5.5.7, y v6.1.0.0, establece un puerto UDP abierto, lo que podría permitir a atacantes remotos sobreescribir direcciones de memoria y eje... • http://secunia.com/advisories/41044 • CWE-399: Resource Management Errors •

CVSS: 9.8EPSS: 0%CPEs: 9EXPL: 0

20 Aug 2010 — Buffer overflow in the message-protocol implementation in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.x.x before 5.5.7, and 6.1.0.0, allows remote attackers to read and modify data, and possibly have other impact, via an unspecified command. Desbordamiento de búfer en el protocolo de implementación message en el servidor en IBM Tivoli Storage Manager (TSM) FastBack v5.x.x anterior a v5.5.7, y v6.1.0.0, permite a atacantes remotos leer y modificar datos, y posiblemente tenga otro impacto, a tra... • http://secunia.com/advisories/41044 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

20 Aug 2010 — Unspecified vulnerability in the message-protocol implementation in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.x.x before 5.5.7, and 6.1.0.0, allows remote attackers to cause a denial of service (daemon outage) via unknown vectors. Vulnerabilidad sin especificar en el protocolo de implementación message en IBM Tivoli Storage Manager (TSM) FastBack v5.x.x anterior a v5.5.7, y v6.1.0.0, permite a atacantes remotos provocar ua denegación de servicio (agotamiento de demonio) a través de vectores ... • http://secunia.com/advisories/41044 •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 0

20 Aug 2010 — Unspecified vulnerability in the message-protocol implementation in the Mount service in IBM Tivoli Storage Manager (TSM) FastBack 5.x.x before 5.5.7, and 6.1.0.0, allows remote attackers to cause a denial of service (recovery failure), and possibly trigger loss of data, via unknown vectors. Vulnerabilidad sin especificar en el protocolo de implementación message en el servicio Mount en IBM Tivoli Storage Manager (TSM) FastBack v5.x.x anterior a v5.5.7, y v6.1.0.0, permite a atacantes remotos provocar una d... • http://secunia.com/advisories/41044 •

CVSS: 9.8EPSS: 73%CPEs: 27EXPL: 1

04 Nov 2009 — Stack-based buffer overflow in the client acceptor daemon (CAD) scheduler in the client in IBM Tivoli Storage Manager (TSM) 5.3 before 5.3.6.7, 5.4 before 5.4.3, 5.5 before 5.5.2.2, and 6.1 before 6.1.0.2, and TSM Express 5.3.3.0 through 5.3.6.6, allows remote attackers to execute arbitrary code via crafted data in a TCP packet. Un desbordamiento de búfer en la región stack de la memoria en el planificador del demonio de aceptación de cliente (CAD) en el cliente en Tivoli Storage Manager (TSM) versiones 5.3... • https://www.exploit-db.com/exploits/16421 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.1EPSS: 0%CPEs: 17EXPL: 0

05 May 2009 — Unspecified vulnerability in the Java GUI in the IBM Tivoli Storage Manager (TSM) client 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.5, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17, and the TSM Express client 5.3.3.0 through 5.3.6.5, allows attackers to read or modify arbitrary files via unknown vectors. Vulnerabilidad inespecífica en Java GUI en el cliente IBM Tivoli Storage Manager (TSM) desde v5.2.0.0 hasta v5.2.5.3, desde v5.3.0.0 hasta v5.3.6.5, desde v5.4.0.0 hasta v5.4.2.6, y desde v5.5.0... • http://secunia.com/advisories/32604 •

CVSS: 7.1EPSS: 0%CPEs: 6EXPL: 0

05 May 2009 — The IBM Tivoli Storage Manager (TSM) client 5.5.0.0 through 5.5.1.17 on AIX and Windows, when SSL is used, allows remote attackers to conduct unspecified man-in-the-middle attacks and read arbitrary files via unknown vectors. El cliente IBM Tivoli Storage Manager (TSM) desde v5.5.0.0 hasta v5.5.1.17 en AIX y Windows, cuando se utiliza SSL, lo que permite atacantes remotos realizar ataques de man-in-the-middle y leer ficheros de forma arbitraria a través de vectores desconocidos. • http://osvdb.org/54235 •

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 0

31 Mar 2009 — Unspecified vulnerability in the server in IBM Tivoli Storage Manager (TSM) 5.3.x before 5.3.2 and 6.x before 6.1 has unknown impact and attack vectors related to the "admin command line." Vulnerabilidad no especificada en el servidor en IBM Tivoli Storage Manager (TSM) 5.3.x versiones anteriores a v5.3.2 y 6.x versiones anteriores a v6.1 tiene un impacto desconocido y vectores de ataque relacionados a la "línea de comandos del administrador". • http://secunia.com/advisories/34498 •