Check Point Reference: | CPAI-2007-322 |
Date Published: | 22 Mar 2010 |
Severity: | Critical |
Last Updated: | Wednesday 09 January, 2019 |
Source: | |
Industry Reference: | CVE-2007-4880 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | IBM Tivoli Storage Manager (TSM) is a backup solution which is meant to protect data from failures and other errors by storing backups and archiving data. The product is available for multiple platforms and various hardware architectures. The Tivoli Storage Manager backup client is composed of several services which are responsible for management of the product, and the backup and restore operations among others. A buffer overflow vulnerability exists in the IBM Tivoli Storage Manager product. The flaw is due to a boundary error in the processing of specially crafted HTTP requests. A remote unauthenticated attacker may exploit this flaw to cause denial of service, or inject and execute arbitrary code on the target host. In case of an attack where code injection is not successful the affected service will terminate abnormally. Restoration of the functionality would require manual restart of the affected service. In case of an attack where code injection and execution is successful, the behavior of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the service process, normally System. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: IBM Tivoli Enforcement Violation.
Attack Information: IBM Tivoli Storage Manager Express CAD service buffer overflow