First published: Wed Dec 29 2010(Updated: )
Stack-based buffer overflow in the GeneratePassword function in dsmtca (aka the Trusted Communications Agent or TCA) in the backup-archive client in IBM Tivoli Storage Manager (TSM) 5.3.x before 5.3.6.10, 5.4.x before 5.4.3.4, 5.5.x before 5.5.2.10, and 6.1.x before 6.1.3.1 on Unix and Linux allows local users to gain privileges by specifying a long LANG environment variable, and then sending a request over a pipe.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Storage Manager | >=5.3.0<=5.3.6.7 | |
IBM Tivoli Storage Manager | >=5.4.0<=5.4.3.3 | |
IBM Tivoli Storage Manager | >=5.5.0<=5.5.2.7 | |
IBM Tivoli Storage Manager | >=6.1.0<=6.1.3 | |
Linux Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4604 is considered high severity due to its potential to allow remote execution of arbitrary code via a stack-based buffer overflow.
To fix CVE-2010-4604, upgrade your IBM Tivoli Storage Manager to version 5.3.6.10 or later, or apply the appropriate patches available from IBM.
CVE-2010-4604 affects versions of IBM Tivoli Storage Manager prior to 5.3.6.10, 5.4.3.4, 5.5.2.10, and 6.1.3.1.
CVE-2010-4604 is classified as a stack-based buffer overflow vulnerability.
Yes, CVE-2010-4604 can be exploited on Unix and Linux systems running the affected versions of IBM Tivoli Storage Manager.