TippingPoint Zero Day Initiative

IBM Tivoli Provisioning Manager for OS Deployment TCP to ODBC Remote Code Execution Vulnerability

ZDI-10-194: October 8th, 2010

CVSS Score

Affected Vendors

Affected Products

    Tivoli Provisioning Manager

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 10516. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary SQL queries on vulnerable installations of Tivoli Provisioning Manager. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the TCP to ODBC gateway component which listens by default on TCP port 2020. Authentication is not required to issue SQL queries to the service. A remote attacker can abuse this to read, modify, or create records within the database.

Vendor Response

IBM has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2010-07-06 - Vulnerability reported to vendor
    2010-10-08 - Coordinated public release of advisory


This vulnerability was discovered by:
    AbdulAziz Hariri