IBM Tivoli Storage is prone to a buffer overflow vulnerability that affects the FastBackMount server. Attackers can leverage this issue to execute arbitrary code with elevated privileges in the context of the FastBackMount process.
This module exploits a remote buffer overflow in the TSM Remote Client Agent (dsmagent) by sending a specially crafted sequence of packets to the affected application.
This module exploits a stack-based buffer overflow vulnerability in IBM Tivoli Endpoint by sending a specially crafted HTTP request. The specific flaw exists within the lcfd.exe process which listens by default on TCP port 9495. To reach this page remotely authentication is required. However, by abusing a built-in account an attacker can access the restricted pages. While parsing requests to one of these, the process blindly copies the contents of a POST variable to a 256 byte stack buffer.
This module exploits a buffer overflow vulnerability in the Community Services Multiplexer (StMux.exe) by requesting a specially crafted URL.
This module exploits a stack-based buffer overflow vulnerability in IBM Lotus Domino by sending a specially crafted HTTP request to the Web Administration Interface.
This module exploits a stack-based buffer overflow in the nHTTP.exe application, a component of Lotus Domino Server, by sending an HTTP request with an invalid value for the If-Modified-Since parameter. Authentication is not required for this exploit to work.
This module exploits a remote stack-based buffer overflow vulnerability in the nrouter.exe component of IBM Lotus Domino when it parses the ORGANIZER field of an iCalendar invitation. This can be exploited by a remote, unauthenticated attacker to execute arbitrary code by sending a specially crafted e-mail with an embedded iCalendar invitation to the Lotus Domino SMTP server. In order to make the Domino server parse the crafted e-mail message, you must supply any valid e-mail address within the target Lotus Domino domain. However, note that no user interaction is required in order to exploit the vulnerability.
This module exploits a remote stack-based buffer overflow vulnerability in the nrouter.exe component of IBM Lotus Domino when it parses the filename of an attachment within an iCalendar invitation. This can be exploited by a remote, unauthenticated attacker to execute arbitrary code by sending a specially crafted e-mail with an embedded iCalendar invitation to the Lotus Domino SMTP server. In order to make the Domino server parse the crafted e-mail message, you must supply any valid e-mail address within the target Lotus Domino domain. However, note that no user interaction is required in order to exploit the vulnerability. This module bypasses Data Execution Prevention.
This module exploits a remote stack-based buffer overflow vulnerability in the Nrouter.exe component of IBM Lotus Domino when it parses a BMP images. This can be exploited by a remote, unauthenticated attacker to execute arbitrary code by sending a specially crafted e-mail to the Lotus Domino SMTP server. In order to make the Domino server parse the crafted e-mail message, you must supply any valid e-mail address within the target Lotus Domino domain. However, note that no user interaction is required in order to exploit the vulnerability. This module bypasses Data Execution Prevention.
This module exploits a buffer overflow vulnerability in the Lotus Domino HTTP server (nHTTP.exe) by sending a specially crafted GET request.
Pagination
- Previous page
- Page 53
- Next page