Original release date: June 5, 2006
Last revised: --
Source: TIBCO Software Inc.
The TIBCO Hawk Monitoring Agent contains a buffer overflow vulnerability in the configuration interface. The impact of this vulnerability may allow a local attacker to execute arbitrary code with system privleges.
TIBCO has released an update which address a critical vulnerability in the Hawk Monitoring Agent. TIBCO strongly recommends sites running the Hawk Monitoring Agent to install the update or take mitigating action as appropriate.
The following components are affected:
A local attacker who is able to modify the configuration of tibhawkhma may be able to execute arbitrary code with system privleges.
If the tibhawkhma program is installed as suid root on a Unix system, the successful exploit will allow arbitrary code execution with root privileges.
If the tibhawkhma program is installed as a system service on a Windows system, the successful exploit will allow arbitrary code execution with system service privileges.
If an upgrade is not possible, taking all of the following steps will mitigate the vulnerability: