IBM Tivoli Storage Manager FastBack Mount CMountDismount::GetVaultDump RCE

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

A virtual mount application running on the remote host is affected by
a remote code execution vulnerability.

Description :

The IBM Tivoli Storage Manager (TSM) FastBack Mount application
running on the remote host is affected by a remote code execution
vulnerability in the FastBackServer.exe service due to improper
validation of user-supplied input to the CMountDismount::GetVaultDump
method. An unauthenticated, remote attacker can exploit this, by
sending a crafted packet to TCP port 30051, to cause a stack-based
buffer overflow, resulting in a denial of service condition or the
execution of arbitrary code.

Note that the FastBack Mount application running on the remote host is
reportedly affected by other vulnerabilities as well; however, Nessus
has not tested for them.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-15-118/
http://www.nessus.org/u?af253f07

Solution :

Upgrade to IBM Tivoli Storage Manager FastBack version 6.1.11.1 or
later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: General

Nessus Plugin ID: 96143 ()

Bugtraq ID: 73917

CVE ID: CVE-2015-0119

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now