|Date: (C)2009-05-05 (M)2017-08-08|
|CVSS Score: 10.0||Access Vector: NETWORK|
|Exploitability Subscore: 10.0||Access Complexity: LOW|
|Impact Subscore: 10.0||Authentication: NONE|
| ||Confidentiality: COMPLETE|
| ||Integrity: COMPLETE|
| ||Availability: COMPLETE|
Multiple stack-based buffer overflows in dsmagent.exe in the Remote Agent Service in the IBM Tivoli Storage Manager (TSM) client 126.96.36.199 through 188.8.131.52, 184.108.40.206 through 220.127.116.11, 18.104.22.168 through 22.214.171.124, and 126.96.36.199 through 188.8.131.52, and the TSM Express client 184.108.40.206 through 220.127.116.11, allow remote attackers to execute arbitrary code via (1) a request packet that is not properly parsed by an unspecified "generic string handling function" or (2) a crafted NodeName in a dicuGetIdentifyRequest request packet, related to the (a) Web GUI and (b) Java GUI.