// For flags

CVE-2008-4801

IBM Tivoli Storage Manager Express for Microsoft SQL Heap Overflow Vulnerability

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Heap-based buffer overflow in the Data Protection for SQL CAD service (aka dsmcat.exe) in the Client Acceptor Daemon (CAD) and the scheduler in the Backup-Archive client 5.1.0.0 through 5.1.8.1, 5.2.0.0 through 5.2.5.2, 5.3.0.0 through 5.3.6.1, 5.4.0.0 through 5.4.2.2, and 5.5.0.0 through 5.5.0.91 in IBM Tivoli Storage Manager (TSM); and the Backup-Archive client in TSM Express; allows remote attackers to execute arbitrary code by sending a large amount of crafted data to a TCP port.

Desbordamiento de búfer basado en montículo en la Protección de Datos para el servicio SQL CAD (también conocido como dsmcat.exe) en Client Acceptor Daemon (CAD Demonio Aceptador de Clientes) y el programador en el cliente de archivos de respaldo de v5.1.0.0 a v5.1.8.1, de v5.2.0.0 a v5.2.5.2, de v5.3.0.0 a v5.3.6.1, de v5.4.0.0 a v5.4.2.2 y de v5.5.0.0 a v5.5.0.91 en Tivoli Storage Manager (TSM)de IBM; y el cliente de archivos de respaldo en TSM Express; permite a atacantes remotos ejecutar código de su elección enviando una gran cantidad de datos manipulados a un puerto TCP.

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of IBM Tivoli Storage Manager Express for Microsoft SQL. Authentication is not required to exploit this vulnerability.
The specific flaw resides in the Data Protection for SQL CAD service, dsmcat.exe, which listens by default on a TCP port above 1024. The process trusts a user-supplied size value, receiving the specified amount of data into a static heap buffer. By sending a specially crafted packet, an attacker can overflow that buffer leading to arbitrary code execution in the context of the SYSTEM user.

*Credits: Manuel Santamarina Suarez
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-10-30 CVE Reserved
  • 2008-10-30 CVE Published
  • 2024-07-21 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Ibm
Search vendor "Ibm"
Tivoli Storage Manager Client
Search vendor "Ibm" for product "Tivoli Storage Manager Client"
>= 5.1 <= 5.1.8.1
Search vendor "Ibm" for product "Tivoli Storage Manager Client" and version " >= 5.1 <= 5.1.8.1"
-
Affected
Ibm
Search vendor "Ibm"
Tivoli Storage Manager Client
Search vendor "Ibm" for product "Tivoli Storage Manager Client"
>= 5.2 <= 5.2.5.2
Search vendor "Ibm" for product "Tivoli Storage Manager Client" and version " >= 5.2 <= 5.2.5.2"
-
Affected
Ibm
Search vendor "Ibm"
Tivoli Storage Manager Client
Search vendor "Ibm" for product "Tivoli Storage Manager Client"
>= 5.3 <= 5.3.6.1
Search vendor "Ibm" for product "Tivoli Storage Manager Client" and version " >= 5.3 <= 5.3.6.1"
-
Affected
Ibm
Search vendor "Ibm"
Tivoli Storage Manager Client
Search vendor "Ibm" for product "Tivoli Storage Manager Client"
>= 5.4 <= 5.4.2.2
Search vendor "Ibm" for product "Tivoli Storage Manager Client" and version " >= 5.4 <= 5.4.2.2"
-
Affected
Ibm
Search vendor "Ibm"
Tivoli Storage Manager Client
Search vendor "Ibm" for product "Tivoli Storage Manager Client"
>= 5.5.0.0 <= 5.5.0.91
Search vendor "Ibm" for product "Tivoli Storage Manager Client" and version " >= 5.5.0.0 <= 5.5.0.91"
-
Affected
Ibm
Search vendor "Ibm"
Tivoli Storage Manager Express
Search vendor "Ibm" for product "Tivoli Storage Manager Express"
*-
Affected