Lucene search

K
zdiBrian Gorenc - HP Zero Day InitiativeZDI-15-118
HistoryApr 08, 2015 - 12:00 a.m.

IBM Tivoli Storage Manager FastBack Mount CMountDismount::GetVaultDump Remote Code Execution Vulnerability

2015-04-0800:00:00
Brian Gorenc - HP Zero Day Initiative
www.zerodayinitiative.com
9

0.779 High

EPSS

Percentile

98.3%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Tivoli Storage Manager FastBack. Authentication is not required to exploit this vulnerability. The specific flaw exists within FastBackServer.exe which listens by default on TCP port 30051. When handling opcode 0x09 packets, the process blindly copies user supplied data into a stack-based buffer within CMountDismount::GetVaultDump. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

0.779 High

EPSS

Percentile

98.3%