The 'id' parameter of IBM Tivoli Storage Manager Version 5 Release 2 (Command Line Administrative Interface, dsmadmc.exe) is vulnerable to an exploitable stack buffer overflow. Note: the vulnerability can be exploited when it is used in "interactive" mode while, cause of a max number characters limitation, it cannot be exploited in batch or command line usage (e.g. dsmadmc.exe -id=username -password=pwd). NOTE: This vulnerability only affects products that are no longer supported by the maintainer
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/VoidSec/Exploit-Development/blob/master/windows/x86/local/IBM_ITSM_Administrator_Client_v.5.2.0.1/IBM_TSM_v.5.2.0.1_exploit.py | Exploit Third Party Advisory | 
| https://voidsec.com/tivoli-madness/#IBM_Tivoli_Storage_Manager | Exploit Third Party Advisory | 
| https://github.com/VoidSec/Exploit-Development/blob/master/windows/x86/local/IBM_ITSM_Administrator_Client_v.5.2.0.1/IBM_TSM_v.5.2.0.1_exploit.py | Exploit Third Party Advisory | 
| https://voidsec.com/tivoli-madness/#IBM_Tivoli_Storage_Manager | Exploit Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 05:22
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/VoidSec/Exploit-Development/blob/master/windows/x86/local/IBM_ITSM_Administrator_Client_v.5.2.0.1/IBM_TSM_v.5.2.0.1_exploit.py - Exploit, Third Party Advisory | |
| References | () https://voidsec.com/tivoli-madness/#IBM_Tivoli_Storage_Manager - Exploit, Third Party Advisory | 
07 Nov 2023, 03:21
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | The 'id' parameter of IBM Tivoli Storage Manager Version 5 Release 2 (Command Line Administrative Interface, dsmadmc.exe) is vulnerable to an exploitable stack buffer overflow. Note: the vulnerability can be exploited when it is used in "interactive" mode while, cause of a max number characters limitation, it cannot be exploited in batch or command line usage (e.g. dsmadmc.exe -id=username -password=pwd). NOTE: This vulnerability only affects products that are no longer supported by the maintainer | 
Information
                Published : 2021-05-06 20:15
Updated : 2024-11-21 05:22
NVD link : CVE-2020-28198
Mitre link : CVE-2020-28198
CVE.ORG link : CVE-2020-28198
JSON object : View
Products Affected
                ibm
- tivoli_storage_manager
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
