IBM Tivoli Storage Manager Client Multiple Vulnerabilities (swg21405562)

critical Nessus Plugin ID 42824

Synopsis

The remote backup client is susceptible to multiple attacks.

Description

The remote host is running an IBM Tivoli Storage Manager (TSM) client.
The version running on the remote host has one or more of the following vulnerabilities :

- A remote stack-based buffer overflow in the client acceptor daemon (CAD) scheduler could lead to the execution of arbitrary code. (CVE-2009-3853)

- A remote, stack-based buffer overflow in the traditional scheduler could lead to the execution of arbitrary code. (CVE-2009-3854)

- There is an unspecified, unauthorized access vulnerability in the Unix, Linux, and OS/400 API clients when specifying the MAILPROG option. This vulnerability reportedly allows a remote attacker to modify arbitrary files on the remote host. (CVE-2009-2855)

Solution

Upgrade to the relevant version of Tivoli Storage Manager client referenced in the vendor's advisory.

Plugin Details

Severity: Critical

ID: 42824

File Name: ibm_tsm_client_swg21405562.nasl

Version: 1.13

Type: remote

Published: 11/16/2009

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:ibm:tivoli_storage_manager

Required KB Items: Services/ibm_tsm_cad

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/3/2009

Vulnerability Publication Date: 11/3/2009

Exploitable With

CANVAS (D2ExploitPack)

Metasploit (IBM Tivoli Storage Manager Express CAD Service Buffer Overflow)

Reference Information

CVE: CVE-2009-3853, CVE-2009-3854, CVE-2009-3855

BID: 36916

CWE: 119

SECUNIA: 32534