A vulnerability has been reported in IBM Tivoli Provisioning Manager for OS Deployment, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
The vulnerability is caused due to a boundary error within the logging functionality of the web server component. This can be exploited to cause a buffer overflow by sending a specially crafted request with an overly large HTTP request method to an affected system (port TCP/443).
Successful exploitation may allow execution of arbitrary code.
The vulnerability is reported in version 220.127.116.11.
Solution: Apply Interim Fix 3, version 18.104.22.168 (5.1.0-TIV-TPMOSD-IF0003). Please see the vendor's advisory for details.
Provided and/or discovered by: An anonymous person, reported via iDefense Labs.
Original Advisory: IBM:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: IBM Tivoli Provisioning Manager for OS Deployment HTTP Server Buffer Overflow
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.