TIBCO Security Advisory: April 19, 2016 - TIBCO Enterprise Message Service™

TIBCO Enterprise Message Service™ vulnerability

Original release date: April 19, 2016
Last revised: --
Source: TIBCO Software Inc.


The TIBCO EMS components listed below contain a buffer overflow in the processing of inbound data.

Systems Affected

  • TIBCO Enterprise Message Service (EMS) 8.2.2 and below
  • TIBCO Enterprise Message Service Appliance 2.3.1 and below

The following components are affected:

  • TIBCO EMS Server (tibemsd)


The impact of this vulnerability includes the theoretical possibility of remote command execution.

  • CVSS v2 Base Score: 4.6 (AV:N/AC:H/Au:S/C:P/I:P/A:P)


TIBCO has released updated versions of the affected components which address these issues.

For each affected system, update to the corresponding software versions:

  • TIBCO Enterprise Message Service (EMS) 8.3.0 or higher
  • TIBCO Enterprise Message Service Appliance 2.4.0 or higher

The information on this page is being provided to you on an "AS IS" and "AS-AVAILABLE" basis. The issues described on this page may or may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of your license and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms of Use, and may be used only for the purposes contemplated by such Terms of Use.



Security FAQs