Description
The 'id' parameter of IBM Tivoli Storage Manager Version 5 Release 2 (Command Line Administrative Interface, dsmadmc.exe) is vulnerable to an exploitable stack buffer overflow. Note: the vulnerability can be exploited when it is used in "interactive" mode while, cause of a max number characters limitation, it cannot be exploited in batch or command line usage (e.g. dsmadmc.exe -id=username -password=pwd). NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References (2)
Core 2
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/VoidSec/Exploit-Development/blob/master/windows/x86/local/IBM_ITSM_Administrator_Client_v.5.2.0.1/IBM_TSM_v.5.2.0.1_exploit.py
Exploit, Third Party Advisory x_refsource_misc
https://voidsec.com/tivoli-madness/#IBM_Tivoli_Storage_Manager
Scores
CVSS v3
7.0
EPSS
0.0009
EPSS Percentile
26.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-787
Status
published
Products (1)
ibm/tivoli_storage_manager
5.2.0.1
Published
May 06, 2021
Tracked Since
Feb 18, 2026