Schweregrad: : Crítico
  Identificador(es) CVE: : CVE-2009-3853
  Data do informe: 15 fevereiro 2011

  Descrição

Stack-based buffer overflow in the client acceptor daemon (CAD) scheduler in the client in IBM Tivoli Storage Manager (TSM) 5.3 before 5.3.6.7, 5.4 before 5.4.3, 5.5 before 5.5.2.2, and 6.1 before 6.1.0.2, and TSM Express 5.3.3.0 through 5.3.6.6, allows remote attackers to execute arbitrary code via crafted data in a TCP packet.

  Exposição das informações

Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.

  Solução

  Trend Micro Deep Security DPI Rule Number: 1003840
  Trend Micro Deep Security DPI Rule Name: 1003840 - IBM Tivoli Storage Manager Client CAD Service Buffer Overflow

  Software infectado e versão:

  • ibm tivoli_storage_manager 5.2.5.3
  • ibm tivoli_storage_manager 5.3
  • ibm tivoli_storage_manager 5.3.0
  • ibm tivoli_storage_manager 5.3.1
  • ibm tivoli_storage_manager 5.3.2
  • ibm tivoli_storage_manager 5.3.2.4
  • ibm tivoli_storage_manager 5.3.3
  • ibm tivoli_storage_manager 5.3.4
  • ibm tivoli_storage_manager 5.3.5
  • ibm tivoli_storage_manager 5.3.5.1
  • ibm tivoli_storage_manager 5.3.6
  • ibm tivoli_storage_manager 5.3.6.1
  • ibm tivoli_storage_manager 5.3.6.2
  • ibm tivoli_storage_manager 5.3.6.3
  • ibm tivoli_storage_manager 5.3.6.4
  • ibm tivoli_storage_manager 5.3.6.5
  • ibm tivoli_storage_manager 5.3.6.6
  • ibm tivoli_storage_manager 5.4.0
  • ibm tivoli_storage_manager 5.4.1
  • ibm tivoli_storage_manager 5.4.2
  • ibm tivoli_storage_manager 5.5.0
  • ibm tivoli_storage_manager 5.5.1
  • ibm tivoli_storage_manager 5.5.2
  • ibm tivoli_storage_manager 6.1.0