CVE-2014-4817CVE-2014-4817

Affected configuration(s):

cpe:/a:ibm:tivoli_storage_manager:5.1.0
cpe:/a:ibm:tivoli_storage_manager:5.1.1
cpe:/a:ibm:tivoli_storage_manager:5.1.5
cpe:/a:ibm:tivoli_storage_manager:5.1.6
cpe:/a:ibm:tivoli_storage_manager:5.1.7
cpe:/a:ibm:tivoli_storage_manager:5.1.8
cpe:/a:ibm:tivoli_storage_manager:5.1.9
cpe:/a:ibm:tivoli_storage_manager:5.1.10
cpe:/a:ibm:tivoli_storage_manager:5.2
cpe:/a:ibm:tivoli_storage_manager:5.2.0
cpe:/a:ibm:tivoli_storage_manager:5.2.1
cpe:/a:ibm:tivoli_storage_manager:5.2.2
cpe:/a:ibm:tivoli_storage_manager:5.2.4
cpe:/a:ibm:tivoli_storage_manager:5.2.5.1
cpe:/a:ibm:tivoli_storage_manager:5.2.5.2
cpe:/a:ibm:tivoli_storage_manager:5.2.5.3
cpe:/a:ibm:tivoli_storage_manager:5.2.7
cpe:/a:ibm:tivoli_storage_manager:5.2.8
cpe:/a:ibm:tivoli_storage_manager:5.2.9
cpe:/a:ibm:tivoli_storage_manager:5.3
cpe:/a:ibm:tivoli_storage_manager:5.3.0
cpe:/a:ibm:tivoli_storage_manager:5.3.1
cpe:/a:ibm:tivoli_storage_manager:5.3.2
cpe:/a:ibm:tivoli_storage_manager:5.3.2.4
cpe:/a:ibm:tivoli_storage_manager:5.3.3
cpe:/a:ibm:tivoli_storage_manager:5.3.4
cpe:/a:ibm:tivoli_storage_manager:5.3.5.1
cpe:/a:ibm:tivoli_storage_manager:5.3.6.1
cpe:/a:ibm:tivoli_storage_manager:5.3.6.2
cpe:/a:ibm:tivoli_storage_manager:5.3.6.3
cpe:/a:ibm:tivoli_storage_manager:5.3.6.4
cpe:/a:ibm:tivoli_storage_manager:5.3.6.5
cpe:/a:ibm:tivoli_storage_manager:5.3.6.6
cpe:/a:ibm:tivoli_storage_manager:5.4
cpe:/a:ibm:tivoli_storage_manager:5.4.0
cpe:/a:ibm:tivoli_storage_manager:5.4.1
cpe:/a:ibm:tivoli_storage_manager:5.4.2
cpe:/a:ibm:tivoli_storage_manager:5.4.2.2
cpe:/a:ibm:tivoli_storage_manager:5.4.2.3
cpe:/a:ibm:tivoli_storage_manager:5.4.2.4
cpe:/a:ibm:tivoli_storage_manager:5.4.3.0
cpe:/a:ibm:tivoli_storage_manager:5.4.3.2
cpe:/a:ibm:tivoli_storage_manager:5.4.3.3
cpe:/a:ibm:tivoli_storage_manager:5.4.4.0
cpe:/a:ibm:tivoli_storage_manager:5.5.0
cpe:/a:ibm:tivoli_storage_manager:5.5.1
cpe:/a:ibm:tivoli_storage_manager:5.5.2
cpe:/a:ibm:tivoli_storage_manager:5.5.3
cpe:/a:ibm:tivoli_storage_manager:5.5.4
cpe:/a:ibm:tivoli_storage_manager:5.5.4.1
cpe:/a:ibm:tivoli_storage_manager:6.0
cpe:/a:ibm:tivoli_storage_manager:6.1.0
cpe:/a:ibm:tivoli_storage_manager:6.1.1
cpe:/a:ibm:tivoli_storage_manager:6.1.2
cpe:/a:ibm:tivoli_storage_manager:6.1.3
cpe:/a:ibm:tivoli_storage_manager:6.1.4
cpe:/a:ibm:tivoli_storage_manager:6.1.5
cpe:/a:ibm:tivoli_storage_manager:6.1.5.4
cpe:/a:ibm:tivoli_storage_manager:6.2.0
cpe:/a:ibm:tivoli_storage_manager:6.2.0.0
cpe:/a:ibm:tivoli_storage_manager:6.2.1
cpe:/a:ibm:tivoli_storage_manager:6.2.2
cpe:/a:ibm:tivoli_storage_manager:6.2.3
cpe:/a:ibm:tivoli_storage_manager:6.2.4
cpe:/a:ibm:tivoli_storage_manager:6.2.4.4
cpe:/a:ibm:tivoli_storage_manager:6.2.4.7
cpe:/a:ibm:tivoli_storage_manager:6.2.6
cpe:/a:ibm:tivoli_storage_manager:6.2.7
cpe:/a:ibm:tivoli_storage_manager:6.3.0
cpe:/a:ibm:tivoli_storage_manager:6.3.0.0
cpe:/a:ibm:tivoli_storage_manager:6.3.0.1
cpe:/a:ibm:tivoli_storage_manager:6.3.0.17
cpe:/a:ibm:tivoli_storage_manager:6.3.1
cpe:/a:ibm:tivoli_storage_manager:6.3.2
cpe:/a:ibm:tivoli_storage_manager:6.3.2.1
cpe:/a:ibm:tivoli_storage_manager:6.3.3
cpe:/a:ibm:tivoli_storage_manager:6.3.4
cpe:/a:ibm:tivoli_storage_manager:6.3.5
cpe:/a:ibm:tivoli_storage_manager:6.3.5.1
cpe:/a:ibm:tivoli_storage_manager:6.4.0
cpe:/a:ibm:tivoli_storage_manager:6.4.0.0
cpe:/a:ibm:tivoli_storage_manager:6.4.1
cpe:/a:ibm:tivoli_storage_manager:6.4.2
cpe:/a:ibm:tivoli_storage_manager:7.1.0

Date published: 2014-11-18T18:59:00.097-05:00

Date last modified: 2017-08-28T21:35:08.577-04:00

CVSS Score: 2.1

Principal attack vector: LOCAL

Complexity:  LOW

Reference URL: http://www-01.ibm.com/support/docview.wss?uid=swg1IT04884

Summary: The server in IBM Tivoli Storage Manager (TSM) 5.x and 6.x before 6.3.5.10 and 7.x before 7.1.1.100 allows remote attackers to bypass intended access restrictions and replace file backups by using a certain backup option in conjunction with a filename that matches a previously used filename.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.