News & Media
Become a member »
» ASB-2009.1123.2 - UPDATE [Win][Netware][Linux][Solar...
ASB-2009.1123.2 - UPDATE [Win][Netware][Linux][Solaris][AIX] IBM Tivoli Storage Manager Client: Multiple vulnerabilities
04 November 2009
Click here for printable version
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2009.1123.2 IBM Tivoli Storage Manager Client - Multiple Vulnerabilities 5 November 2009 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: IBM Tivoli Storage Manager Client Operating System: Windows Linux variants AIX Solaris Windows Netware Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Unauthorised Access -- Remote/Unauthenticated Modify Arbitrary Files -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2009-3855 CVE-2009-3854 CVE-2009-3853 Member content until: Saturday, December 5 2009 Revision History: November 5 2009: Added CVE References November 5 2009: Initial Release OVERVIEW IBM have released fixes for a number of vulnerabilities in IBM Tivoli Storage Manager Client. IMPACT The vendor has provided the following information regarding these vulnerabilities : CAD Scheduler Buffer Overrun: A buffer overrun vulnerability exists in the client acceptor daemon (CAD) scheduler, which has the potential to crash the TSM client agent process or to allow malicious code injection. The malicious code could, for example, allow an unauthorized user to read, copy, alter, or delete files on the client machine. Traditional Scheduler Buffer Overrun: A buffer overrun vulnerability exists in the traditional client scheduler, which has the potential to crash the TSM client or to allow malicious code injection. The malicious code could, for example, allow an unauthorized user to read, copy, alter, or delete files on the client machine. Unauthorized Access with MAILPROG option: An unauthorized access vulnerability exists in the UNIX and Linux backup-archive clients and the OS/400 API client when the MAILPROG option is specified. The vulnerability could, for example, allow an unauthorized user to read, copy, alter, or delete files on the client machine. MITIGATION Fixes have been released for the affected version of Tivoli Storage Manager Client. Please see the vendor's advisory  for the download link for your specific version. REFERENCES  IBM Tivoli Storage Manager (TSM) Client Security Fixes - November 2009 http://www-01.ibm.com/support/docview.wss?uid=swg21405562 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: firstname.lastname@example.org Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFK8k5hNVH5XJJInbgRAiPWAJ9lRNGTHVRYx6qN9C0/gcO2rDBrEQCdGQgG aT1+bWtR1WIfgNTwfkbyGOI= =QVOb -----END PGP SIGNATURE-----
Comments? Click here