Vulnerabilities > IBM > Tivoli Storage Manager > 7.1.0.0

DATE CVE VULNERABILITY TITLE RISK
2018-11-12 CVE-2018-1786 Resource Exhaustion vulnerability in IBM products
IBM Spectrum Protect 7.1 and 8.1 dsmc and dsmcad processes incorrectly accumulate TCP/IP sockets in a CLOSE_WAIT state.
network
low complexity
ibm linux microsoft CWE-400
5.0
2017-02-01 CVE-2016-6110 Credentials Management vulnerability in IBM products
IBM Tivoli Storage Manager discloses unencrypted login credentials to Vmware vCenter that could be obtained by a local user.
local
low complexity
ibm linux microsoft CWE-255
2.1
2017-02-01 CVE-2016-0371 Unspecified vulnerability in IBM Tivoli Storage Manager
The Tivoli Storage Manager (TSM) password may be displayed in plain text via application trace output while application tracing is enabled.
local
low complexity
ibm
5.5
2017-02-01 CVE-2016-5985 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in IBM Tivoli Storage Manager
The IBM Tivoli Storage Manager (IBM Spectrum Protect) AIX client is vulnerable to a buffer overflow when Journal-Based Backup is enabled.
local
low complexity
ibm CWE-119
7.2
2016-02-15 CVE-2015-7408 Permissions, Privileges, and Access Controls vulnerability in IBM Tivoli Storage Manager
The server in IBM Spectrum Protect (aka Tivoli Storage Manager) 5.5 and 6.x before 6.3.5.1 and 7.x before 7.1.4 does not properly restrict use of the ASNODENAME option, which allows remote attackers to read or write to backup data by leveraging proxy authority.
network
high complexity
ibm CWE-264
2.6
2014-08-26 CVE-2013-6335 Improper Preservation of Permissions vulnerability in IBM Tivoli Storage Manager
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and restore operations, which allows local users to bypass intended access restrictions via standard filesystem operations.
3.3