Key Information About the Vulnerability Summary Advisory Title: IBM TSM FastBack Server FXCLI_checkIndexDBLocation Remote Code Execution Vulnerability Date: September 29th, 2010 Identifiers: - ZDI-10-183 - ZDI-CAN-662 Severity CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C Affected Components Vendor: IBM Vulnerable Product: Tivoli Storage Manager FastBack Vulnerability Overview Description: This vulnerability allows remote attackers to execute arbitrary code on vulnerable IBM Tivoli FastBack Server installations. No authentication is required. Details: The vulnerability is in FastBackServer.exe, listening on TCP port 11460, involving a strcpy function that copies user-supplied data to a fixed-size buffer. This can be exploited by providing a sufficiently long variable, leading to remote code execution. Additional Information Protection: Trend Micro TippingPoint IPS customers are protected by protection filter ID ['9489']. Reference: [](http://www.ibm.com/support/docview.wss?uid=swg21443820 Issue 2) Disclosure Timeline: - 2010-02-02: Vulnerability reported to vendor - 2010-09-29: Coordinated public release of advisory Credit Discoverer: Sebastian Apelt (www.siberas.de)