|CVSS SCORE||7.5, (AV:N/AC:L/Au:N/C:P/I:P/A:P)|
Tivoli Storage Manager FastBack
|TREND MICRO CUSTOMER PROTECTION||Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 19320. For further product information on the TippingPoint IPS: http://www.tippingpoint.com|
The specific flaw exists within FastBackServer.exe which listens by default on TCP port 30051. When handling opcode 0x09 packets, the process blindly copies user supplied data into a stack-based buffer within CMountDismount::GetVaultDump. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.
IBM has issued an update to correct this vulnerability. More details can be found at:
|CREDIT||Brian Gorenc - HP Zero Day Initiative