TIBCO Security Advisory: April 28, 2009 - TIBCO SmartSockets®

TIBCO SmartSockets® vulnerability

Original release date: April 28, 2009
Last revised: --
CVE-2009-1291
Source: TIBCO Software Inc.

Description

TIBCO SmartSockets components listed above contain buffer overflow vulnerabilities in the processing of inbound data. The impact of these vulnerabilities may include remote execution of arbitrary code, information disclosure, and denial of service.

TIBCO has released updates which address critical vulnerabilities in the server and library components of TIBCO SmartSockets.

These vulnerabilities directly affect the SmartSockets server (rtserver) and applications utilizing the SmartSockets libraries.

TIBCO strongly recommends sites running the affected components to install the update or take mitigating action as appropriate.

Systems Affected

  • TIBCO SmartSockets versions below 6.8.2

The following components are affected:

  • TIBCO SmartSockets Server (rtserver)
  • TIBCO SmartSockets client libraries (rtconn, rtedm, rtipc, rtipcl, rtmsg, rtsm, rtutil)

Impact

The impact of these vulnerabilities varies depending on the operating system and the privilege levels of the user that invokes the server or application.

On Unix based systems, the successful exploit will allow arbitrary code execution with the privileges of the user that invoked the server or application.

On Windows based systems, the successful exploit will allow arbitrary code execution with the privileges of the user that invoked the server or application. If the server or application is installed as a system service, this will result in access to system privileges.

Solution

  • Upgrade TIBCO SmartSockets to version 6.8.2 or above.  This is strongly recommended.

If an upgrade is not possible, the following actions can mitigate the vulnerabilities:

  • Disable the rtserver UDP port if it has been enabled in the rtserver configuration file.
  • Utilize a firewall to restrict access to the rtserver.
  • Use a user with restricted privileges to invoke the rtserver or application.On Unix systems, invoke the server or application from a chroot environment.  This will restrict the ability to access or modify information in the event of a successful exploit.

---------------------

The information on this page is being provided to you on an "AS IS" and "AS-AVAILABLE" basis. The issues described on this page may or may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms of Use, and may be used only for the purposes contemplated by such Terms of Use.

SECURITY ADVISORIES FOR TIBCO PRODUCTS

ADVISORY FREQUENTLY ASKED QUESTIONS

Security FAQs