First published: Thu May 06 2021(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** The 'id' parameter of IBM Tivoli Storage Manager Version 5 Release 2 (Command Line Administrative Interface, dsmadmc.exe) is vulnerable to an exploitable stack buffer overflow. Note: the vulnerability can be exploited when it is used in "interactive" mode while, cause of a max number characters limitation, it cannot be exploited in batch or command line usage (e.g. dsmadmc.exe -id=username -password=pwd). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Tivoli Storage Manager | =5.2.0.1 | |
=5.2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-28198.
The severity of CVE-2020-28198 is high.
IBM Tivoli Storage Manager Version 5 Release 2 (5.2.0.1) is affected by CVE-2020-28198.
The CWE ID for this vulnerability is CWE-119 and CWE-787.
Yes, there are references available for CVE-2020-28198. You can find them at the following links: [Reference 1](https://github.com/VoidSec/Exploit-Development/blob/master/windows/x86/local/IBM_ITSM_Administrator_Client_v.5.2.0.1/IBM_TSM_v.5.2.0.1_exploit.py), [Reference 2](https://voidsec.com/tivoli-madness/#IBM_Tivoli_Storage_Manager).