Users of IBM TSM FastBack Server _DAS_ReadBlockReply please be advised of a Remote Denial of Service vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Amplify’d from www.criticalwatch.com
ZDI-10-187: [ZDI-10-187] IBM TSM FastBack Server _DAS_ReadBlockReply Remote Denial of Service Vulnerability
-- Affected Products:
IBM Tivoli Storage Manager FastBack
-- Vulnerability Details:
This vulnerability allows remote attackers to create a denial of service
condition on vulnerable installations of IBM Tivoli FastBack Server.
Authentication is not required to exploit this vulnerability.
The specific flaw exists within FastBackServer.exe process which listens
by default on TCP port 11406. The problematic code resides within a
function responsible for reading a block of network packet data. A
parameter to this function is initialized to 0 and under certain
conditions this value will be accessed before properly initialized. This
causes a NULL pointer to be dereferenced and subsequent application
crash due to a lack of exception handling. Successful exploitation leads
to immediate termination of the fastback server.
Read more at www.criticalwatch.com
See this Amp at http://bit.ly/b1PqKT

No comments:
Post a Comment