CVE-2014-6184
Summary
| CVE | CVE-2014-6184 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2015-02-22 02:59:00 UTC |
| Updated | 2021-09-08 17:19:00 UTC |
| Description | Stack-based buffer overflow in dsmtca in the client in IBM Tivoli Storage Manager (TSM) 5.4 through 5.4.3.6, 5.5 through 5.5.4.3, 6.1 through 6.1.5.6, 6.2 before 6.2.5.4, and 6.3 before 6.3.2.3 on UNIX, Linux, and OS X allows local users to gain privileges via unspecified vectors. |
Risk And Classification
Problem Types: CWE-787
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Apple | Macos | - | All | All | All |
| Operating System | Apple | Mac Os | - | All | All | All |
| Operating System | Apple | Mac Os | - | All | All | All |
| Application | Ibm | Tivoli Storage Manager | All | All | All | All |
| Application | Ibm | Tivoli Storage Manager | All | All | All | All |
| Application | Ibm | Tivoli Storage Manager | All | All | All | All |
| Application | Ibm | Tivoli Storage Manager | All | All | All | All |
| Application | Ibm | Tivoli Storage Manager | All | All | All | All |
| Operating System | Linux | Linux Kernel | - | All | All | All |
| Operating System | Linux | Linux Kernel | - | All | All | All |
| Operating System | Opengroup | Unix | - | All | All | All |
| Operating System | Opengroup | Unix | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| IBM Security Bulletin: Tivoli Storage Manager Stack-based Buffer Overflow Elevation of Privilege: CVE-2014-6184 - United States | CONFIRM | www-01.ibm.com | Vendor Advisory |
| IT05707: TSM UNIX AND LINUX CLIENT LOCAL ESCALATION OF PRIVILEGE VULNERABILITY DUE TO STACK-BASED BUFFER OVERFLOW | AIXAPAR | www-01.ibm.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.