SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Firewall)  >   IBM Tivoli Firewall Security Toolbox Vendors:   IBM, Tivoli
IBM Tivoli Firewall Security Toolbox Unspecified Flaw Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1006324
SecurityTracker URL:  http://securitytracker.com/id/1006324
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 19 2003
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.2
Description:   A vulnerability was reported in the IBM Tivoli Firewall Security Toolbox. A remote user can execute arbitrary code on the firewalled system.

It is reported that the code will run with the privileges of the Firewall Security Toolbox (typically 'nobody' user privileges on UNIX systems).

According to CERT, the toolbox is not part of the default base installation of IBM's Tivoli Management Environment.

No further details were provided regarding the nature of this flaw.

IBM credits Ubizen with reporting this flaw.

Impact:   A remote user can execute arbitrary code on the target system. The code will run with the privileges of the Tivoli Firewall Security Toolbox.
Solution:   The vendor has released a fixed version (1.3). IBM Tivoli customers that are registered on IBM's support web site can obtain additional information at:

http://www-1.ibm.com/support/search.wss?rs=769&tc=SSXLSW&dc=D600&rankprofile=8

The patches are reportedly available at:

ftp://ftp.software.ibm.com/software/tivoli_support/patches/patches_1.3

[Editor's note: Regrettably, IBM has not publicly posted their support notice, so we are only able to provide limited information regarding this flaw.]

Vendor URL:  www.ibm.com/support/search.wss?rs=769&tc=SSXLSW&dc=D600&rankprofile=8 (Links to External Site)
Cause:   Not specified
Underlying OS:  UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (NT), Windows (2000)

Message History:   None.


 Source Message Contents

Subject:  Tivoli Firewall Toolbox flaw


IBM reported that there is a security vulnerability with the IBM Tivoli Firewall Toolbox, version
1.2.  The flaw has reportedly been corrected in version 1.3.

CERT reported that the vulnerability allows a remote user to execute arbitrary code on the firewall
with the privileges of the Firewall Toolbox (typically 'nobody' user privileges). According to CERT,
the toolbox is not part of the default base installation of IBM's Tivoli Management Environment.

Tivoli customers can obtain more information at:

http://www.ibm.com/software/sysmgmt/products/support/IBMTivoliManagementFramework.html
 
The patches are reportedly available at:

ftp://ftp.software.ibm.com/software/tivoli_support/patches/patches_1.3


IBM credits Ubizen with reporting this flaw.


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC