2 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 17EXPL: 0

Unspecified vulnerability in the Java GUI in the IBM Tivoli Storage Manager (TSM) client 5.2.0.0 through 5.2.5.3, 5.3.0.0 through 5.3.6.5, 5.4.0.0 through 5.4.2.6, and 5.5.0.0 through 5.5.1.17, and the TSM Express client 5.3.3.0 through 5.3.6.5, allows attackers to read or modify arbitrary files via unknown vectors. Vulnerabilidad inespecífica en Java GUI en el cliente IBM Tivoli Storage Manager (TSM) desde v5.2.0.0 hasta v5.2.5.3, desde v5.3.0.0 hasta v5.3.6.5, desde v5.4.0.0 hasta v5.4.2.6, y desde v5.5.0.0 hasta v5.5.1.17, y el cliente TSM Express desde v5.3.3.0 hasta v5.3.6.5, permite a atacantes remotos leer o modificar ficheros de forma arbitraria a través de vectores desconocidos. • http://secunia.com/advisories/32604 http://www-01.ibm.com/support/docview.wss?uid=swg21384389 http://www-1.ibm.com/support/docview.wss?uid=swg1IC59779 http://www.vupen.com/english/advisories/2009/1235 https://exchange.xforce.ibmcloud.com/vulnerabilities/50329 •

CVSS: 10.0EPSS: 11%CPEs: 6EXPL: 0

Heap-based buffer overflow in the Data Protection for SQL CAD service (aka dsmcat.exe) in the Client Acceptor Daemon (CAD) and the scheduler in the Backup-Archive client 5.1.0.0 through 5.1.8.1, 5.2.0.0 through 5.2.5.2, 5.3.0.0 through 5.3.6.1, 5.4.0.0 through 5.4.2.2, and 5.5.0.0 through 5.5.0.91 in IBM Tivoli Storage Manager (TSM); and the Backup-Archive client in TSM Express; allows remote attackers to execute arbitrary code by sending a large amount of crafted data to a TCP port. Desbordamiento de búfer basado en montículo en la Protección de Datos para el servicio SQL CAD (también conocido como dsmcat.exe) en Client Acceptor Daemon (CAD Demonio Aceptador de Clientes) y el programador en el cliente de archivos de respaldo de v5.1.0.0 a v5.1.8.1, de v5.2.0.0 a v5.2.5.2, de v5.3.0.0 a v5.3.6.1, de v5.4.0.0 a v5.4.2.2 y de v5.5.0.0 a v5.5.0.91 en Tivoli Storage Manager (TSM)de IBM; y el cliente de archivos de respaldo en TSM Express; permite a atacantes remotos ejecutar código de su elección enviando una gran cantidad de datos manipulados a un puerto TCP. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of IBM Tivoli Storage Manager Express for Microsoft SQL. Authentication is not required to exploit this vulnerability. The specific flaw resides in the Data Protection for SQL CAD service, dsmcat.exe, which listens by default on a TCP port above 1024. The process trusts a user-supplied size value, receiving the specified amount of data into a static heap buffer. • http://secunia.com/advisories/32465 http://www-01.ibm.com/support/docview.wss?uid=swg21322623 http://www-1.ibm.com/support/docview.wss?uid=swg1IC56773 http://www.securityfocus.com/archive/1/497950/100/0/threaded http://www.securityfocus.com/bid/31988 http://www.securitytracker.com/id?1021122 http://www.vupen.com/english/advisories/2008/2969 http://www.zerodayinitiative.com/advisories/ZDI-08-071 https://exchange.xforce.ibmcloud.com/vulnerabilities/46208 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •