CVE-2020-28198

The 'id' parameter of IBM Tivoli Storage Manager Version 5 Release 2 (Command Line Administrative Interface, dsmadmc.exe) is vulnerable to an exploitable stack buffer overflow. Note: the vulnerability can be exploited when it is used in "interactive" mode while, cause of a max number characters limitation, it cannot be exploited in batch or command line usage (e.g. dsmadmc.exe -id=username -password=pwd). NOTE: This vulnerability only affects products that are no longer supported by the maintainer
Configurations

Configuration 1 (hide)

cpe:2.3:a:ibm:tivoli_storage_manager:5.2.0.1:*:*:*:*:*:*:*

History

07 Nov 2023, 03:21

Type Values Removed Values Added
Summary ** UNSUPPORTED WHEN ASSIGNED ** The 'id' parameter of IBM Tivoli Storage Manager Version 5 Release 2 (Command Line Administrative Interface, dsmadmc.exe) is vulnerable to an exploitable stack buffer overflow. Note: the vulnerability can be exploited when it is used in "interactive" mode while, cause of a max number characters limitation, it cannot be exploited in batch or command line usage (e.g. dsmadmc.exe -id=username -password=pwd). NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The 'id' parameter of IBM Tivoli Storage Manager Version 5 Release 2 (Command Line Administrative Interface, dsmadmc.exe) is vulnerable to an exploitable stack buffer overflow. Note: the vulnerability can be exploited when it is used in "interactive" mode while, cause of a max number characters limitation, it cannot be exploited in batch or command line usage (e.g. dsmadmc.exe -id=username -password=pwd). NOTE: This vulnerability only affects products that are no longer supported by the maintainer

14 May 2021, 20:32

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 4.4
v3 : 7.0
References (MISC) https://voidsec.com/tivoli-madness/#IBM_Tivoli_Storage_Manager - (MISC) https://voidsec.com/tivoli-madness/#IBM_Tivoli_Storage_Manager - Exploit, Third Party Advisory
References (MISC) https://github.com/VoidSec/Exploit-Development/blob/master/windows/x86/local/IBM_ITSM_Administrator_Client_v.5.2.0.1/IBM_TSM_v.5.2.0.1_exploit.py - (MISC) https://github.com/VoidSec/Exploit-Development/blob/master/windows/x86/local/IBM_ITSM_Administrator_Client_v.5.2.0.1/IBM_TSM_v.5.2.0.1_exploit.py - Exploit, Third Party Advisory
CPE cpe:2.3:a:ibm:tivoli_storage_manager:5.2.0.1:*:*:*:*:*:*:*
CWE CWE-787

07 May 2021, 09:31

Type Values Removed Values Added

06 May 2021, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-06 20:15

Updated : 2024-04-11 01:08


NVD link : CVE-2020-28198

Mitre link : CVE-2020-28198

CVE.ORG link : CVE-2020-28198


JSON object : View

Products Affected

ibm

  • tivoli_storage_manager
CWE
CWE-787

Out-of-bounds Write