TIBCO Rendezvous and derived components listed below contain buffer overflow vulnerabilities in the processing of inbound data. The impact of these vulnerabilities may include remote execution of arbitrary code, information disclosure, and denial of service.
TIBCO has released updates that address critical vulnerabilities in server and library components of TIBCO Rendezvous.
TIBCO Rendezvous and derived components contain a vulnerability that may allow an attacker to compromise the server or application by sending a specially crafted message.
TIBCO strongly recommends sites running the affected components to install the update or take mitigating action as appropriate.
The following components are affected:
The impact of these vulnerabilities varies depending on the operating system and the privilege levels of the user that invokes the server or application.
On Unix based systems, a successful exploit against the Rendezvous communication daemons (rvd, rvrd, rvsd, rvsrd) will allow arbitrary code execution with the privileges of the user that invoked that daemon, with the exception of user id 0 ("root"). If the daemon component was invoked by user id 0, a successful exploit will result in access to privileges of user id 65534 ("nobody").
On Unix based systems, a successful exploit against all other components will allow arbitrary code execution with the privileges of the user that invoked the server or application.
On Windows based systems, a successful exploit will allow arbitrary code execution with the privileges of the user that invoked the server or application. If the server or application is installed as a system service, this will result in access to system privileges.
Upgrade TIBCO Rendezvous to version 8.1.0 or above. Update all components derived from TIBCO Rendezvous to use version 8.1.0 or above. This is strongly recommended.
If an upgrade is not possible, the following actions can mitigate the vulnerabilities: