what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

IBM Tivoli Storage Manager Express Backup Heap Corruption

IBM Tivoli Storage Manager Express Backup Heap Corruption
Posted Mar 11, 2009
Site assurent.com

A remotely exploitable vulnerability has been discovered in the backup service of IBM Tivoli Storage Manager server. Specifically, the vulnerability is due to improper memory handling when processing incoming client requests and can lead to heap corruption. This vulnerability can allow attackers to inject and execute arbitrary code on the target host with System or root privileges. The vulnerability has been confirmed in IBM Tivoli Storage Manager Express version 5.3.7.3.

tags | advisory, arbitrary, root
SHA-256 | d443091d0ed515e079807a635ea0ae6f542074d84d3ba127f39996a4cb60b047

IBM Tivoli Storage Manager Express Backup Heap Corruption

Change Mirror Download
IBM Tivoli Storage Manager Express Backup Heap Corruption

Assurent ID: FSC20090310-02

1. Affected Software

IBM Tivoli Storage Manager 5.4.4.0 to 5.4.4.0
IBM Tivoli Storage Manager 5.3 all levels
IBM Tivoli Storage Manager 5.2 all levels
IBM Tivoli Storage Manager Express all levels

Reference: http://www-01.ibm.com/software/tivoli/products/storage-mgr/

2. Vulnerability Summary

A remotely exploitable vulnerability has been discovered in the backup service of IBM Tivoli Storage Manager server. Specifically, the vulnerability is due to improper memory handling when processing incoming client requests and can lead to heap corruption. This vulnerability can allow attackers to inject and execute arbitrary code on the target host with System or root privileges.

3. Vulnerability Analysis

A remote unauthenticated attacker can exploit the vulnerability by sending a malicious request to the target system. A successful attack will result in arbitrary code executed on the target host with System or root privileges. An unsuccessful attack can create a Denial of Service (DoS) condition for the IBM Tivoli Storage Manager backup service.

4. Vulnerability Detection

Assurent has confirmed the vulnerability in:

IBM Tivoli Storage Manager Express 5.3.7.3

5. Workaround

Apply the vendor patch, or limit access to the affected communication port for trusted hosts and networks only.

6. Vendor Response

IBM has released a bulletin addressing this vulnerability.

Reference: http://www-01.ibm.com/support/docview.wss?rs=3039&context=SSRQGY&dc=D600&uid=swg21377388&loc=en_US&cs=utf-8&lang=en

7. Disclosure Timeline

2008-10-16 Reported to vendor
2008-10-29 Initial vendor response
2009-03-10 Vendor disclosure

8. Credits

Vulnerability Research Team, Assurent Secure Technologies, a TELUS company

9. References

CVE:
Vendor: 1377388

10. About Assurent VRS

Assurent's Vulnerability Research Service (VRS) for security product vendors, and Threat Protection Programs (TPP) for MSPs and enterprise security teams, help to eliminate the significant costs incurred by security product vendors, MSPs, and enterprise security teams in responding to and managing critical new security vulnerabilities and other threats including worm & virus outbreaks and other malware. The VRS and TPP services are real-time feeds providing subscribers with detailed analysis of the top security vulnerabilities, focused on the specific needs of each group of customers.

http://www.assurent.com/index.php?id=17
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close