Introducing the all-new TIBCO Community site!

For current users, please click "Sign In" to reset your password and access the enhanced features. If you're a first-time visitor, we extend a warm welcome—click "Sign Up" to become a part of the TIBCO Community!

If you're seeking alternative community sites, explore ibi, Jaspersoft, and Spotfire.

Jump to content
  • TIBCO Security Advisory: April 9, 2008 - TIBCO Enterprise MessageService™


    admin

    TIBCO Enterprise Message Service™ vulnerability

    Original release date: April 9, 2008
    Lastrevised: --
    CVE-2008-1703, CVE-2008-1704
    Source: TIBCO SoftwareInc.


    TIBCO Enterprise Message Service vulnerability

    Original release date: April 9, 2008
    Last revised: --
    Source: TIBCO Software Inc.


    Systems Affected

    TIBCO Enterprise Message Service (EMS) versions below 4.4.3
    TIBCO iProcess Engine versions 10.6.0 thru 10.6.1

    The following components are affected:

    * TIBCO EMS Server (tibemsd)


    Overview

    The TIBCO EMS server contains buffer overflow vulnerabilities in the
    processing of inbound data. The impact of these vulnerabilities may
    include remote execution of arbitrary code, information disclosure,
    and denial of service.


    I. Description

    TIBCO has released an update that addresses critical vulnerabilities
    in the server component of TIBCO EMS.

    The EMS server contains vulnerabilities that may allow an attacker to
    compromise the server by sending a specially crafted message to the
    EMS server via an EMS client connection or via the TIBCO Rendezvous
    Daemon.

    TIBCO strongly recommends sites running the affected component to
    install the update or take mitigating action as appropriate.


    II. Impact

    The impact of these vulnerabilities varies depending on the operating
    system, configuration options of the server, and the privilege
    levels of the user that invokes the server.

    On Unix based systems, a successful exploit will allow arbitrary
    code execution with the privileges of the user that invoked the
    server.

    On Windows based systems, a successful exploit will allow
    arbitrary code execution with the privileges of the user that
    invoked the server. If the server component is installed as a
    system service, this will result in access to system privileges.


    III. Solution

    Upgrade TIBCO Enterprise Messaging Service to version 4.4.3 or
    above. This is strongly recommended.

    If an upgrade is not possible, the following actions can mitigate
    the vulnerabilities:

    * Ensure that authorization is enabled in the EMS server and
    that all authorized users defined locally or in LDAP are fully
    trusted.
    * Utilize a firewall to restrict access to the EMS server
    port to trusted sources.
    * Disable Rendezvous support by setting "tibrv_transports"
    to "disabled" in the configuration file for the EMS server
    (tibemsd.conf).


    References

    http://www.tibco.com/mk/advisory.jsp
    CVE: CVE-2008-1703, CVE-2008-1704

    The information on this page is being provided to you on an"AS IS" and "AS-AVAILABLE" basis. The issues described on this page may or may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein.ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED.BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATIONCONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you donot have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms of Use, and may be used only for the purposes contemplated by such Terms ofUse.



×
×
  • Create New...