The TCP-to-ODBC gateway in IBM Tivoli Provisioning Manager for OS Deployment 7.1.1.3 does not require authentication for SQL statements, which allows remote attackers to modify, create, or read database records via a session on TCP port 2020. NOTE: the vendor disputes this issue, stating that the "default Microsoft Access database is not password protected because it is intended to be used for evaluation purposes only.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/index.jsp?topic=%2Fcom.ibm.tivoli.tpm.osd.doc%2Finstall%2Ftosd_setmsacessdbpwd.html - | |
References | () http://securitytracker.com/id?1024539 - | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-10-194 - |
07 Nov 2023, 02:06
Type | Values Removed | Values Added |
---|---|---|
Summary | The TCP-to-ODBC gateway in IBM Tivoli Provisioning Manager for OS Deployment 7.1.1.3 does not require authentication for SQL statements, which allows remote attackers to modify, create, or read database records via a session on TCP port 2020. NOTE: the vendor disputes this issue, stating that the "default Microsoft Access database is not password protected because it is intended to be used for evaluation purposes only. |
Information
Published : 2010-10-28 21:00
Updated : 2024-11-21 01:20
NVD link : CVE-2010-4121
Mitre link : CVE-2010-4121
CVE.ORG link : CVE-2010-4121
JSON object : View
Products Affected
ibm
- tivoli_provisioning_manager_os_deployment
CWE
CWE-287
Improper Authentication