Security at TIBCO

Security@TIBCO

TIBCO takes its security responsibilities very seriously. This page provides information about TIBCO security and how customers or security researchers can contact TIBCO to report or ask about a security issue.

Security at TIBCO

TIBCO Security Advisory: June 5, 2006 - TIBCO Hawk®

TIBCO Hawk® vulnerability

Original release date: June 5, 2006
Last revised: --
Source: TIBCO Software Inc.

Description

The TIBCO Hawk Monitoring Agent contains a buffer overflow vulnerability in the configuration interface. The impact of this vulnerability may allow a local attacker to execute arbitrary code with system privleges.

TIBCO has released an update which address a critical vulnerability in the Hawk Monitoring Agent. TIBCO strongly recommends sites running the Hawk Monitoring Agent to install the update or take mitigating action as appropriate.

Systems Affected

  • TIBCO Hawk versions below 4.6.1
     
  • TIBCO Runtime Agent (TRA) versions below 5.4

The following components are affected:

  • TIBCO Hawk HMA (tibhawkhma)

Impact

A local attacker who is able to modify the configuration of tibhawkhma may be able to execute arbitrary code with system privleges.

If the tibhawkhma program is installed as suid root on a Unix system, the successful exploit will allow arbitrary code execution with root privileges.

If the tibhawkhma program is installed as a system service on a Windows system, the successful exploit will allow arbitrary code execution with system service privileges.

Solution

 

  • Upgrade TIBCO Hawk to version 4.6.1 or above.  This is strongly recommended.

If an upgrade is not possible, taking all of the following steps will mitigate the vulnerability:

  • Set the permissions of the tibhawkhma configuration file such that only the system administrator may write to the configuration file.
  • Set the permissions of the tibhawkhma executable such that only the system administrator may launch the program.
  • On Unix systems, Set the permissions of the tibhawkhmaexecutable such that it is not suid.

The information on this page is being provided to you on an "AS IS" and "AS-AVAILABLE" basis. The issues described on this page may or may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms of Use, and may be used only for the purposes contemplated by such Terms of Use.

SECURITY ADVISORIES FOR TIBCO PRODUCTS

ADVISORY FREQUENTLY ASKED QUESTIONS

Security FAQs