IBM Tivoli Storage Manager 7.1.0.0

CPE Details

IBM Tivoli Storage Manager 7.1.0.0
7.1.0.0
2019-10-29 18:55 +00:00
2019-10-29 18:55 +00:00

Alerte pour un CPE

Stay informed of any changes for a specific CPE.
Alert management

CPE Name: cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.0:*:*:*:*:*:*:*

Informations

Vendor

ibm

Product

tivoli_storage_manager

Version

7.1.0.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2018-1786 2018-11-07 23:00 +00:00 IBM Spectrum Protect 7.1 and 8.1 dsmc and dsmcad processes incorrectly accumulate TCP/IP sockets in a CLOSE_WAIT state. This can cause TCP/IP resource leakage and may result in a denial of service. IBM X-Force ID: 148871.
7.5
HIGH
CVE-2016-6110 2017-02-01 21:00 +00:00 IBM Tivoli Storage Manager discloses unencrypted login credentials to Vmware vCenter that could be obtained by a local user.
6.5
MEDIUM
CVE-2016-0371 2017-02-01 20:00 +00:00 The Tivoli Storage Manager (TSM) password may be displayed in plain text via application trace output while application tracing is enabled.
5.5
MEDIUM
CVE-2016-5985 2017-02-01 19:00 +00:00 The IBM Tivoli Storage Manager (IBM Spectrum Protect) AIX client is vulnerable to a buffer overflow when Journal-Based Backup is enabled. A local attacker could overflow a buffer and execute arbitrary code on the system or cause a system crash.
7.8
HIGH
CVE-2015-7408 2016-02-15 01:00 +00:00 The server in IBM Spectrum Protect (aka Tivoli Storage Manager) 5.5 and 6.x before 6.3.5.1 and 7.x before 7.1.4 does not properly restrict use of the ASNODENAME option, which allows remote attackers to read or write to backup data by leveraging proxy authority.
3.7
LOW
CVE-2013-6335 2014-08-26 08:00 +00:00 The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and restore operations, which allows local users to bypass intended access restrictions via standard filesystem operations.
3.3
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.