CVE-2009-1522
https://notcve.org/view.php?id=CVE-2009-1522
The IBM Tivoli Storage Manager (TSM) client 5.5.0.0 through 5.5.1.17 on AIX and Windows, when SSL is used, allows remote attackers to conduct unspecified man-in-the-middle attacks and read arbitrary files via unknown vectors. El cliente IBM Tivoli Storage Manager (TSM) desde v5.5.0.0 hasta v5.5.1.17 en AIX y Windows, cuando se utiliza SSL, lo que permite atacantes remotos realizar ataques de man-in-the-middle y leer ficheros de forma arbitraria a través de vectores desconocidos. • http://osvdb.org/54235 http://secunia.com/advisories/32604 http://www-01.ibm.com/support/docview.wss?uid=swg21384389 http://www-1.ibm.com/support/docview.wss?uid=swg1IC59781 http://www.vupen.com/english/advisories/2009/1235 https://exchange.xforce.ibmcloud.com/vulnerabilities/50330 •
CVE-2009-1521
https://notcve.org/view.php?id=CVE-2009-1521
Unspecified vulnerability in the Java GUI in the IBM Tivoli Storage Manager (TSM) client 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.5, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17, and the TSM Express client 5.3.3.0 through 5.3.6.5, allows attackers to read or modify arbitrary files via unknown vectors. Vulnerabilidad inespecífica en Java GUI en el cliente IBM Tivoli Storage Manager (TSM) desde v5.2.0.0 hasta v5.2.5.3, desde v5.3.0.0 hasta v5.3.6.5, desde v5.4.0.0 hasta v5.4.2.6, y desde v5.5.0.0 hasta v5.5.1.17, y el cliente TSM Express desde v5.3.3.0 hasta v5.3.6.5, permite a atacantes remotos leer o modificar ficheros de forma arbitraria a través de vectores desconocidos. • http://secunia.com/advisories/32604 http://www-01.ibm.com/support/docview.wss?uid=swg21384389 http://www-1.ibm.com/support/docview.wss?uid=swg1IC59779 http://www.vupen.com/english/advisories/2009/1235 https://exchange.xforce.ibmcloud.com/vulnerabilities/50329 •
CVE-2009-1520
https://notcve.org/view.php?id=CVE-2009-1520
Buffer overflow in the Web GUI in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17 allows attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors. Desbordamiento de búfer en el interfaz gráfico de usuario Web en el cliente IBM Tivoli Storage Manager (TSM) desde v5.1.0.0 hasta v5.1.8.2, desde v5.2.0.0 hasta v5.2.5.3, desde v5.3.0.0 hasta v5.3.6.4, desde v5.4.0.0 hasta v5.4.2.6, y desde v5.5.0.0 hasta v5.5.1.17 permite a atacantes producir una denegación de servicio (caída de aplicación) o ejecutar código arbitrario a través de vectores inespecíficos. • http://secunia.com/advisories/32604 http://www-01.ibm.com/support/docview.wss?uid=swg21384389 http://www-1.ibm.com/support/docview.wss?uid=swg1IC59994 http://www.vupen.com/english/advisories/2009/1235 https://exchange.xforce.ibmcloud.com/vulnerabilities/50328 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-4828 – IBM Tivoli Storage Manager Express RCA Service - Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2008-4828
Multiple stack-based buffer overflows in dsmagent.exe in the Remote Agent Service in the IBM Tivoli Storage Manager (TSM) client 5.1.0.0 through 5.1.8.2, 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.4, and 5.4.0.0 through 5.4.1.96, and the TSM Express client 5.3.3.0 through 5.3.6.4, allow remote attackers to execute arbitrary code via (1) a request packet that is not properly parsed by an unspecified "generic string handling function" or (2) a crafted NodeName in a dicuGetIdentifyRequest request packet, related to the (a) Web GUI and (b) Java GUI. Múltiples desbordamientos de búfer basados en pila en dsmagent.exe en el agente de servicio remoto en el cliente IBM Tivoli Storage Manager (TSM) desde v5.1.0.0 hasta v5.1.8.2, desde v5.2.0.0 hasta 5.2.5.3, desde v5.3.0.0 hasta v5.3.6.4, y desde v5.4.0.0 hasta v5.4.1.96, y el cliente TSM Express desde v5.3.3.0 hasta v5.3.6.4, permite atacantes remotos ejecutar código de forma arbitraria a través de (1) una petición de paquete que no esta adecuadamente parseada mediante una "función genérica de manejo de cadena" inespecífica o (2) un "NodeName" manipulado en una petición de paquete "dicuGetIdentifyRequest", relacionado con (a) Interfaz gráfico de usuario y (b) interfaz gráfico de usuario Java. • https://www.exploit-db.com/exploits/16428 http://osvdb.org/54231 http://osvdb.org/54232 http://secunia.com/advisories/32604 http://secunia.com/secunia_research/2008-55 http://www-01.ibm.com/support/docview.wss?uid=swg21384389 http://www-1.ibm.com/support/docview.wss?uid=swg1IC59513 http://www.securityfocus.com/archive/1/503182/100/0/threaded http://www.vupen.com/english/advisories/2009/1235 https://exchange.xforce.ibmcloud.com/vulnerabilities/50327 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-4801 – IBM Tivoli Storage Manager Express for Microsoft SQL Heap Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2008-4801
Heap-based buffer overflow in the Data Protection for SQL CAD service (aka dsmcat.exe) in the Client Acceptor Daemon (CAD) and the scheduler in the Backup-Archive client 5.1.0.0 through 5.1.8.1, 5.2.0.0 through 5.2.5.2, 5.3.0.0 through 5.3.6.1, 5.4.0.0 through 5.4.2.2, and 5.5.0.0 through 5.5.0.91 in IBM Tivoli Storage Manager (TSM); and the Backup-Archive client in TSM Express; allows remote attackers to execute arbitrary code by sending a large amount of crafted data to a TCP port. Desbordamiento de búfer basado en montículo en la Protección de Datos para el servicio SQL CAD (también conocido como dsmcat.exe) en Client Acceptor Daemon (CAD Demonio Aceptador de Clientes) y el programador en el cliente de archivos de respaldo de v5.1.0.0 a v5.1.8.1, de v5.2.0.0 a v5.2.5.2, de v5.3.0.0 a v5.3.6.1, de v5.4.0.0 a v5.4.2.2 y de v5.5.0.0 a v5.5.0.91 en Tivoli Storage Manager (TSM)de IBM; y el cliente de archivos de respaldo en TSM Express; permite a atacantes remotos ejecutar código de su elección enviando una gran cantidad de datos manipulados a un puerto TCP. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of IBM Tivoli Storage Manager Express for Microsoft SQL. Authentication is not required to exploit this vulnerability. The specific flaw resides in the Data Protection for SQL CAD service, dsmcat.exe, which listens by default on a TCP port above 1024. The process trusts a user-supplied size value, receiving the specified amount of data into a static heap buffer. • http://secunia.com/advisories/32465 http://www-01.ibm.com/support/docview.wss?uid=swg21322623 http://www-1.ibm.com/support/docview.wss?uid=swg1IC56773 http://www.securityfocus.com/archive/1/497950/100/0/threaded http://www.securityfocus.com/bid/31988 http://www.securitytracker.com/id?1021122 http://www.vupen.com/english/advisories/2008/2969 http://www.zerodayinitiative.com/advisories/ZDI-08-071 https://exchange.xforce.ibmcloud.com/vulnerabilities/46208 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •