Users of IBM TSM FastBack Server Format String please be advised of a Remote Code Execution vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Amplify’d from www.criticalwatch.com
ZDI-10-185: [ZDI-10-185] IBM TSM FastBack Server Format String Remote Code Execution Vulnerability
-- Affected Products:
IBM Tivoli Storage Manager
-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of IBM Tivoli Storage Manager Fastback.
Authentication is not required to exploit this vulnerability.
The specific flaw exists within the FastBack server process
(FastBackServer.exe) which listens by default on TCP port 11406. The
process searches received packet data for a pipe character (0x7c) and
then sends the remaining portion of the string to the event log without
sanitization. By providing a specially crafted string with format
specifiers this can be leveraged to trigger a format string
vulnerability which can lead to arbitrary code execution in the context
of the server process.
Read more at www.criticalwatch.com
See this Amp at http://bit.ly/al6XVf

No comments:
Post a Comment