The TIBCO Platform is a real-time, composable data platform that will bring together an evolving set of your TIBCO solutions - and it's available now!
A chart showing the TIBCO Platform vision
Jump to content
  • TIBCO Security Advisory: August 25, 2015 - TIBCORendezvous®


    admin

    TIBCO Rendezvous® vulnerability

    Original release date: August 25,2015
    Last revised: --
    CVE-2015-4555
    Source: TIBCO Software Inc.



    TIBCO Rendezvous vulnerability

    Original release date: August 25, 2015
    Last revised: --
    Source: TIBCO Software Inc.


    Systems Affected

    TIBCO Rendezvous 8.4.3 and below (all distributions)
    TIBCO Rendezvous Network Server 1.1.0 and below
    TIBCO Substation ES 2.8.1 and below
    TIBCO Messaging Appliance 8.7.1 and below

    The following components are affected:

    * TIBCO Rendezvous Daemon (rvd)
    * TIBCO Rendezvous Routing Daemon (rvrd)
    * TIBCO Rendezvous Secure Daemon (rvsd)
    * TIBCO Rendezvous Secure Routing Daemon (rvsrd)
    * TIBCO Rendezvous Gateway Daemon (rvgd)
    * TIBCO Rendezvous Daemon Adapter (rvda)
    * TIBCO Rendezvous Cache (rvcache)
    * TIBCO Rendezvous Agent (rva)
    * TIBCO Rendezvous Relay Agent (rvrad)


    Description

    The TIBCO Rendezvous daemon components listed above contain a buffer
    overflow vulnerability in the HTTP administrative interface.


    Impact

    The impact of this vulnerability includes denial of service and the
    theoretical possibility of remote execution of arbitrary code.

    CVSS v2 Base Score: 4.3 (AV:A/AC:H/Au:N/C:P/I:P/A:P)


    Solution

    TIBCO has released updated versions of the affected components which
    address these issues. TIBCO strongly recommends sites running the affected
    components to install the applicable update as described below.

    For each affected system, update to the corresponding software versions:

    TIBCO Rendezvous 8.4.4 or higher
    TIBCO Rendezvous Network Server 1.1.1 or higher
    TIBCO Substation ES 2.9.0 or higher
    TIBCO Messaging Appliance 8.7.2 or higher


    References

    http://www.tibco.com/mk/advisory.jsp
    CVE: CVE-2015-4555

    The information on this page is being provided to you on an "AS IS" and "AS-AVAILABLE" basis. The issues described on this page mayor may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUTNOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANYDIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of yourlicense and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms ofUse, and may be used only for the purposes contemplated by such Terms ofUse.



×
×
  • Create New...