---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: IBM Tivoli Storage Manager Client Multiple Vulnerabilities SECUNIA ADVISORY ID: SA32534 VERIFY ADVISORY: http://secunia.com/advisories/32534/ DESCRIPTION: Some vulnerabilities have been reported in IBM Tivoli Storage Manager (TSM) Client, which can be exploited by malicious people to bypass certain security restrictions or compromise a vulnerable system. 1) An input validation error in the CAD service can be exploited to cause a stack-based buffer overflow by sending a specially crafted TCP packet. Successful exploitation allows execution of arbitrary code. The vulnerability is confirmed in Tivoli Storage Manager Express Backup Client Version 5, Release 3, Level 6.2. Other versions may also be affected. 2) A boundary error in the Traditional Scheduler component can be exploited to cause a buffer overflow and potentially execute arbitrary code. 3) An unspecified error exists in the UNIX and Linux backup-archive clients and the OS/400 API client. This can be exploited to bypass access restrictions and read, copy, alter, or delete arbitrary files when the MAILPROG option is specified. SOLUTION: Update to the latest version. NOTE: Updated 6.1, 5.5, and 5.4 Windows and NetWare packages introduce a bug resulting in missed backups. Please see the vendor's advisory for more information. TSM 6.1.0.2 (all platforms): http://www.ibm.com/support/docview.wss?&uid=swg24023937 TSM 5.5.2.2 (AIX, Linux x86, Solaris SPARC, HP-UX, Windows): http://www.ibm.com/support/docview.wss?uid=swg24023022 TSM 5.5.2.3 (Mac): http://www.ibm.com/support/docview.wss?uid=swg24023022 TSM 5.5.2.4 (Linux PPC, Linux zSeries, Linux Itanium, NetWare, Solaris x86/x86_64, z/OS USS): http://www.ibm.com/support/docview.wss?uid=swg24023022 TSM 5.4.3 (all platforms): http://www.ibm.com/support/docview.wss?uid=swg24023757 TSM 5.3.6.7 ("special clients" supported in 5.4 on Windows 2000, Solaris 8, or Linux x86 RHEL 3): http://www.ibm.com/support/docview.wss?uid=swg24019416 TSM 5.3.6.7 (5.3 clients with support extensions on AIX, Linux x86, Solaris SPARC, HP-UX PA-RISC, or Windows x32/x64): http://www.ibm.com/support/docview.wss?uid=swg24021007 TSM Express 5.3.6.7 (Windows x32/x64): ftp://ftp.software.ibm.com/storage/tivoli-storage-management/patches/client/v5r3/Windows/express/v536/ TSM 5.5.2 (OS/400 API): ftp://ftp.software.ibm.com/storage/tivoli-storage-management/maintenance/client/v5r5/OS400/v552/ PROVIDED AND/OR DISCOVERED BY: 1) Dyon Balding, Secunia Research 2, 3) Reported by the vendor. ORIGINAL ADVISORY: IBM (IC54489, IC61036, IC61058): http://www-01.ibm.com/support/docview.wss?uid=swg21405562 Secunia Research: http://secunia.com/secunia_research/2008-51/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------