Friday, October 1, 2010

IBM TSM FastBack Server Format String: Remote Code Execution Vulnerability

Users of IBM TSM FastBack Server Format String please be advised of a Remote Code Execution vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com

ZDI-10-185: [ZDI-10-185] IBM TSM FastBack Server Format String Remote Code Execution Vulnerability

-- Affected Products:

IBM Tivoli Storage Manager
-- Vulnerability Details:

This vulnerability allows remote attackers to execute arbitrary code on

vulnerable installations of IBM Tivoli Storage Manager Fastback.

Authentication is not required to exploit this vulnerability.



The specific flaw exists within the FastBack server process

(FastBackServer.exe) which listens by default on TCP port 11406. The

process searches received packet data for a pipe character (0x7c) and

then sends the remaining portion of the string to the event log without

sanitization. By providing a specially crafted string with format

specifiers this can be leveraged to trigger a format string

vulnerability which can lead to arbitrary code execution in the context

of the server process.


Read more at www.criticalwatch.com
 

No comments:

Post a Comment