Users of IBM TSM FastBack Mount Service please be advised of a Code Execution vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Amplify’d from www.criticalwatch.com
ZDI-10-179: [ZDI-10-179] IBM TSM FastBack Mount Service Code Execution Vulnerability
-- Affected Products:
IBM Tivoli Storage Manager
-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of IBM Tivoli Storage Manager Fastback.
Authentication is not required to exploit this vulnerability.
The specific flaw exists within the Mount service (FastBackMount.exe).
This process listens by default on UDP port 30005. This process writes
the value 0x01 to the address specified by the second DWORD from a
packet received to it's UDP port. An attacker can exploit this behavior
to execute arbitrary code by making several requests to this service.
Read more at www.criticalwatch.com
See this Amp at http://bit.ly/dkUphS

No comments:
Post a Comment