← Zuruck zu CVEs
CVE-2010-4604
N/ABeschreibung
Stack-based buffer overflow in the GeneratePassword function in dsmtca (aka the Trusted Communications Agent or TCA) in the backup-archive client in IBM Tivoli Storage Manager (TSM) 5.3.x before 5.3.6.10, 5.4.x before 5.4.3.4, 5.5.x before 5.5.2.10, and 6.1.x before 6.1.3.1 on Unix and Linux allows local users to gain privileges by specifying a long LANG environment variable, and then sending a request over a pipe.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht12/29/2010
Zuletzt geandert4/29/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
ibm:tivoli_storage_managerlinux:linux_kernel
Schwachen (CWE)
CWE-787
Referenzen
http://secunia.com/advisories/42639(cve@mitre.org)
http://securitytracker.com/id?1024901(cve@mitre.org)
http://www-01.ibm.com/support/docview.wss?uid=swg1IC65491(cve@mitre.org)
http://www.exploit-db.com/exploits/15745(cve@mitre.org)
http://www.ibm.com/support/docview.wss?uid=swg21454745(cve@mitre.org)
http://www.securityfocus.com/archive/1/515263/100/0/threaded(cve@mitre.org)
http://www.vupen.com/english/advisories/2010/3251(cve@mitre.org)
http://secunia.com/advisories/42639(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1024901(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg1IC65491(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/15745(af854a3a-2127-422b-91ae-364da2661108)
http://www.ibm.com/support/docview.wss?uid=swg21454745(af854a3a-2127-422b-91ae-364da2661108)
http://www.kryptoslogic.com/advisories/2010/kryptoslogic-ibm-tivoli-dsmtca-exploit.c(af854a3a-2127-422b-91ae-364da2661108)
http://www.kryptoslogic.com/advisories/2010/kryptoslogic-ibm-tivoli-dsmtca.txt(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/515263/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/3251(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.