Security at TIBCO

Security@TIBCO

TIBCO takes its security responsibilities very seriously. This page provides information about TIBCO security and how customers or security researchers can contact TIBCO to report or ask about a security issue.

Security at TIBCO

TIBCO Security Advisory: February 1, 2011 - TIBCO Rendezvous and Enterprise Message Service

TIBCO Rendezvous and Enterprise Message Service vulnerabilities

Original release date: February 1, 2011
Last revised: --
CVE-2011-0649
Source: TIBCO Software Inc.

Description

TIBCO Rendezvous and EMS components listed below contain a SUID vulnerability which could potentially grant unauthorized root access to an attacker on Unix-based systems.

TIBCO has released updates that address a critical vulnerability in server components of TIBCO Rendezvous and EMS. TIBCO strongly recommends sites running the affected components to install the update or take mitigating action as appropriate.

Systems Affected

  • TIBCO Rendezvous versions 8.2.1 through 8.3.0
  • TIBCO Enterprise Message Service (EMS) versions 5.1.0 through 6.0.0
  • TIBCO Runtime Agent (TRA) versions 5.6.2 through 5.7.0
  • TIBCO Silver BPM Service versions below 1.0.4
  • TIBCO Silver CAP Service versions below 1.0.2
  • TIBCO Silver BusinessWorks Service version 1.0.0

The following components are affected:

  • TIBCO Rendezvous Routing Daemon (rvrd)
  • TIBCO Rendezvous Secure Daemon (rvsd)
  • TIBCO Rendezvous Secure Routing Daemon (rvsrd)
  • TIBCO EMS Server (tibemsd)

Impact

On Unix-based systems a successful attack will result in a privilege escalation to root, granting the attacker full administrative control of the host.

Solution

For each affected system, update to the corresponding software versions:

  • TIBCO Rendezvous version 8.3.1 or higher
  • TIBCO Enterprise Message Service 6.0.1 or higher
  • TIBCO Runtime Agent (TRA) version 5.7.1 or higher
  • TIBCO Silver BPM Service version 1.0.4 or higher
  • TIBCO Silver CAP Service version 1.0.2 or higher
  • TIBCO Silver BusinessWorks Service version 1.0.1 or higher

This is strongly recommended.

If an upgrade is not possible, the vulnerability can be completely mitigated by disabling SUID rights for all affected components.

The information on this page is being provided to you on an "AS IS" and "AS-AVAILABLE" basis. The issues described on this page may or may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms of Use, and may be used only for the purposes contemplated by such Terms of Use.

SECURITY ADVISORIES FOR TIBCO PRODUCTS

ADVISORY FREQUENTLY ASKED QUESTIONS

Security FAQs