IBM Tivoli Firewall Toolbox (TFST) Unspecified Remote Overflow

critical Nessus Plugin ID 11434

Language:

Synopsis

The remote host has an application that is affected by buffer overflow vulnerability.

Description

The remote service (probably the Tivoli Relay daemon) is vulnerable to a buffer overflow when it receives a long string.

An attacker may use this flaw to execute arbitrary code on this host (with the privilege of the user 'nobody').

Solution

Apply vendor-supplied patches.

See Also

ftp://ftp.software.ibm.com/software/tivoli_support/patches/patches_1.3

Plugin Details

Severity: Critical

ID: 11434

File Name: tivoli_relay_overflow.nasl

Version: 1.17

Type: remote

Family: Firewalls

Published: 3/21/2003

Updated: 8/1/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:ibm:tivoli_firewall_toolbox

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 3/21/2003

Reference Information

CVE: CVE-2003-1104

BID: 7154, 7157