The 'id' parameter of IBM Tivoli Storage Manager Version 5 Release 2 (Command Line Administrative Interface, dsmadmc.exe) is vulnerable to an exploitable stack buffer overflow. Note: the vulnerability can be exploited when it is used in "interactive" mode while, cause of a max number characters limitation, it cannot be exploited in batch or command line usage (e.g. dsmadmc.exe -id=username -password=pwd). NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link | Resource |
---|---|
https://github.com/VoidSec/Exploit-Development/blob/master/windows/x86/local/IBM_ITSM_Administrator_Client_v.5.2.0.1/IBM_TSM_v.5.2.0.1_exploit.py | Exploit Third Party Advisory |
https://voidsec.com/tivoli-madness/#IBM_Tivoli_Storage_Manager | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-05-06T19:25:28
Updated: 2024-06-26T20:28:28.562Z
Reserved: 2020-11-04T00:00:00
Link: CVE-2020-28198
JSON object: View
NVD Information
Status : Modified
Published: 2021-05-06T20:15:09.587
Modified: 2024-06-26T21:15:11.340
Link: CVE-2020-28198
JSON object: View
Redhat Information
No data.
CWE