Advisory Details

June 30th, 2015

IBM Tivoli Storage Manager FastBack Server FXCLI_OraBR_Exec_Command Remote Code Execution Vulnerability

ZDI-15-263
ZDI-CAN-2801

CVE ID CVE-2015-1929
CVSS SCORE 10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)
AFFECTED VENDORS IBM
AFFECTED PRODUCTS Tivoli Storage Manager FastBack
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 19764. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Tivoli Storage Manager FastBack. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the FXCLI_OraBR_Exec_Command function. By sending a crafted packet on TCP port 11460, an attacker is able to cause a stack buffer overflow. An attacker can use this to execute arbitrary code under the context of SYSTEM.

VENDOR RESPONSE IBM has issued an update to correct this vulnerability. More details can be found at:
http://www-01.ibm.com/support/docview.wss?uid=swg21959398
DISCLOSURE TIMELINE
  • 2015-04-15 - Vulnerability reported to vendor
  • 2015-06-30 - Coordinated public release of advisory
CREDIT Lola Montez
BACK TO ADVISORIES