IBM Tivoli Storage Manager Client Multiple Vulnerabilities (swg21405562)

Critical Nessus Plugin ID 42824


The remote backup client is susceptible to multiple attacks.


The remote host is running an IBM Tivoli Storage Manager (TSM) client.
The version running on the remote host has one or more of the following vulnerabilities :

- A remote stack-based buffer overflow in the client acceptor daemon (CAD) scheduler could lead to the execution of arbitrary code. (CVE-2009-3853)

- A remote, stack-based buffer overflow in the traditional scheduler could lead to the execution of arbitrary code. (CVE-2009-3854)

- There is an unspecified, unauthorized access vulnerability in the Unix, Linux, and OS/400 API clients when specifying the MAILPROG option. This vulnerability reportedly allows a remote attacker to modify arbitrary files on the remote host. (CVE-2009-2855)


Upgrade to the relevant version of Tivoli Storage Manager client referenced in the vendor's advisory.

Plugin Details

Severity: Critical

ID: 42824

File Name: ibm_tsm_client_swg21405562.nasl

Version: $Revision: 1.11 $

Type: remote

Published: 2009/11/16

Modified: 2016/11/23

Dependencies: 26186, 10107

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ibm:tivoli_storage_manager

Required KB Items: Services/ibm_tsm_cad

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/11/03

Vulnerability Publication Date: 2009/11/03

Exploitable With

CANVAS (D2ExploitPack)

Metasploit (IBM Tivoli Storage Manager Express CAD Service Buffer Overflow)

Reference Information

CVE: CVE-2009-3853, CVE-2009-3854, CVE-2009-3855

BID: 36916

OSVDB: 59632, 59633, 59634

Secunia: 32534

CWE: 119