{ "id": "CVE-2010-3059", "sourceIdentifier": "cve@mitre.org", "published": "2010-08-20T18:00:02.670", "lastModified": "2025-04-11T00:51:21.963", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the message-protocol implementation in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.x.x before 5.5.7, and 6.1.0.0, allows remote attackers to read and modify data, and possibly have other impact, via an unspecified command." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el protocolo de implementaci\u00f3n message en el servidor en IBM Tivoli Storage Manager (TSM) FastBack v5.x.x anterior a v5.5.7, y v6.1.0.0, permite a atacantes remotos leer y modificar datos, y posiblemente tenga otro impacto, a trav\u00e9s de un comando sin especificar." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 7.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-119" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7A482E38-2B78-4064-8682-F7A571D1734C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "840361B9-B3F8-448B-BC7E-065BA4871E46" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "8734E08A-716E-4E29-A440-5FB437F7EF46" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9FF1E98E-B3F5-4348-8D45-B9A8CC916F47" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA49D704-CCC4-48C0-91F9-E6A3A4181FE0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D3202AE-CCAB-4120-8F60-B8809C8B192F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "43030674-F9E7-483E-8F47-4B5075A480D7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:5.5.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B6611E2-9E6A-407A-8649-874E12F12791" }, { "vulnerable": true, "criteria": "cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6C7756DB-DD6D-4A63-9214-131431F809A0" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/41044", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC69883", "source": "cve@mitre.org" }, { "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21443820", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/42549", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/41044", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC69883", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21443820", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/42549", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }