Introducing the all-new TIBCO Community site!

For current users, please click "Sign In" to reset your password and access the enhanced features. If you're a first-time visitor, we extend a warm welcome—click "Sign Up" to become a part of the TIBCO Community!

If you're seeking alternative community sites, explore ibi, Jaspersoft, and Spotfire.

Jump to content
  • TIBCO Security Advisory: April 8, 2014 - TIBCORendezvous®


    admin

    TIBCO Rendezvous vulnerability

    Original release date: April 8, 2014
    Last revised: --
    CVE-2014-2541, CVE-2014-2542, CVE-2014-2543
    Source: TIBCO SoftwareInc.



    TIBCO Rendezvous vulnerability

    Original release date: April 8, 2014
    Last revised: --
    Source: TIBCO Software Inc.


    Systems Affected

    TIBCO Rendezvous 8.4.1 and below
    TIBCO Messaging Appliance 8.7.0 and below
    TIBCO Substation ES 2.8.0 and below

    The following components are affected:

    * TIBCO Rendezvous Daemon (rvd)
    * TIBCO Rendezvous Routing Daemon (rvrd)
    * TIBCO Rendezvous Secure Daemon (rvsd)
    * TIBCO Rendezvous Secure Routing Daemon (rvsrd)


    Description

    The TIBCO Rendezvous components listed above are affected by the
    following critical vulnerabilities:

    CVE-2014-2541 - Access controls will not be properly enforced in some
    circumstances. This may allow unauthorized users to view or modify
    information.

    CVE-2014-2542 - A cross-site scripting vulnerability exists which may
    allow an attacker to view or modify information.

    CVE-2014-2543 - A buffer overflow vulnerability exists in the processing
    of data from directly connected clients which could potentially allow an
    attacker to execute arbitrary code.

    TIBCO has released updated versions of the affected components which
    address these issues. TIBCO strongly recommends sites running the affected
    components to install the applicable update as described below.


    Impact

    The impact of these vulnerabilities may include denial of service,
    information disclosure, information modification, or arbitrary code
    execution.


    Solution

    For each affected system, update to the corresponding software versions:

    TIBCO Rendezvous 8.4.2 or higher
    TIBCO Messaging Appliance 8.7.1 or higher
    TIBCO Substation ES 2.8.1 or higher


    References

    http://www.tibco.com/mk/advisory.jsp
    CVE: CVE-2014-2541, CVE-2014-2542, CVE-2014-2543

    The information on this page is being provided to you on an"AS IS" and "AS-AVAILABLE" basis. The issues described on this page may or may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein.ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED.BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATIONCONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you donot have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms of Use, and may be used only for the purposes contemplated by such Terms ofUse.



×
×
  • Create New...