TIBCO takes its security responsibilities very seriously. This page provides information about TIBCO security and how customers or security researchers can contact TIBCO to report or ask about a security issue.
TIBCO Security Advisory: June 5, 2006 - TIBCO Hawk®
TIBCO Hawk® vulnerability
Original release date: June 5, 2006
Last revised: --
Source: TIBCO Software Inc.
The TIBCO Hawk Monitoring Agent contains a buffer overflow vulnerability in the configuration interface. The impact of this vulnerability may allow a local attacker to execute arbitrary code with system privleges.
TIBCO has released an update which address a critical vulnerability in the Hawk Monitoring Agent. TIBCO strongly recommends sites running the Hawk Monitoring Agent to install the update or take mitigating action as appropriate.
- TIBCO Hawk versions below 4.6.1
- TIBCO Runtime Agent (TRA) versions below 5.4
The following components are affected:
- TIBCO Hawk HMA (tibhawkhma)
A local attacker who is able to modify the configuration of tibhawkhma may be able to execute arbitrary code with system privleges.
If the tibhawkhma program is installed as suid root on a Unix system, the successful exploit will allow arbitrary code execution with root privileges.
If the tibhawkhma program is installed as a system service on a Windows system, the successful exploit will allow arbitrary code execution with system service privileges.
- Upgrade TIBCO Hawk to version 4.6.1 or above. This is strongly recommended.
If an upgrade is not possible, taking all of the following steps will mitigate the vulnerability:
- Set the permissions of the tibhawkhma configuration file such that only the system administrator may write to the configuration file.
- Set the permissions of the tibhawkhma executable such that only the system administrator may launch the program.
- On Unix systems, Set the permissions of the tibhawkhmaexecutable such that it is not suid.