Introducing the all-new TIBCO Community site!

For current users, please click "Sign In" to reset your password and access the enhanced features. If you're a first-time visitor, we extend a warm welcome—click "Sign Up" to become a part of the TIBCO Community!

If you're seeking alternative community sites, explore ibi, Jaspersoft, and Spotfire.

Jump to content
  • TIBCO Security Advisory: March 23, 2021 - TIBCO Rendezvous -2021-28818


    admin

    TIBCO Rendezvous Windows Platform Artifact Search vulnerability

    Original release date: March 23, 2021
    Last revised:
    CVE-2021-28818
    Source: TIBCOSoftware Inc.

    Products Affected

    TIBCO Rendezvous versions 8.5.1 and below

    TIBCO Rendezvous Developer Edition versions 8.5.1 and below

    The following components are affected:

    * Rendezvous Routing Daemon (rvrd)
    * Rendezvous Secure Routing Daemon (rvrsd)
    * Rendezvous Secure Daemon (rvsd)
    * Rendezvous Cache (rvcache)
    * Rendezvous Secure C API
    * Rendezvous Java API
    * Rendezvous .Net API


    Description

    The components listed above contain a vulnerability that theoretically allows
    a low privileged attacker with local access on the Windows operating system to
    insert malicious software. The affected component can be abused to execute the
    malicious software inserted by the attacker with the elevated privileges of
    the component. This vulnerability results from the affected component
    searching for run-time artifacts outside of the installation hierarchy.


    Impact

    The impact of this vulnerability includes the possibility of an attacker
    gaining full access to the Windows operating system at the privilege level of
    the affected component.

    CVSS v3 Base Score: 8.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)


    Solution

    TIBCO has released updated versions of the affected systems which address this
    issue:

    TIBCO Rendezvous versions 8.5.1 and below update to version 8.5.2 or higher

    TIBCO Rendezvous Developer Edition versions 8.5.1 and below update to
    version 8.5.2 or higher


    Acknowledgments

    TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for
    discovery of this vulnerability.

    References

    http://www.tibco.com/services/support/advisories
    CVE-2021-28818

    The information on this page is being provided toyou on an "AS IS" and "AS-AVAILABLE" basis. The issues described on this page may or may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the informationcontained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE AREHEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THEINFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement.If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms of Use, and may be used only for the purposes contemplated by such Terms ofUse.



×
×
  • Create New...