Security Advisory for SmartSockets Product Family (RTworks)
book
Article ID: KB0108167
calendar_today
Updated On:
Products
Versions
TIBCO SmartSockets Product Family
-
Not Applicable
-
Description
Description: TIBCO SmartSockets Product Family (RTworks) vulnerability
Original release date: January 15, 2008 Last revised: -- Source: TIBCO Software Inc.
Systems Affected
TIBCO SmartSockets Product Family (RTworks) versions below 4.0.4
The following components are affected:
* TIBCO RTworks Server (rtserver) * TIBCO RTworks Data Archive Process (rtarchive) * TIBCO RTworks Data Playback Process (rtplayback) * TIBCO RTworks Data Acquisition Process (rtdaq) * TIBCO RTworks Human Computer Interface (rthci) * TIBCO RTworks Inference Engine (rtie) * TIBCO RTworks libraries (rtipc, rtutil)
Overview
TIBCO RTworks components listed above contain buffer overflow vulnerabilities in the processing of inbound data. The impact of these vulnerabilities may include remote execution of arbitrary code, information disclosure, and denial of service.
I. Description
TIBCO has released updates which address critical vulnerabilities in the server and library components of the TIBCO RTworks.
These vulnerabilities directly affect the RTworks server (rtserver) and applications utilizing the TipcConnAccept interface. These vulnerabilities may also affect applications utilizing the RTworks libraries if an attacker is able to inject data into the server/client TCP connection.
TIBCO strongly recommends sites running the affected components to install the update or take mitigating action as appropriate.
II. Impact
The impact of these vulnerabilities varies depending on the operating system and the privilege levels of the user that invokes the server or application.
The successful exploit will allow arbitrary code execution with the privileges of the user that invoked the server or application.
III. Solution
Upgrade TIBCO RTworks to version 4.0.4 or above. This is strongly recommended.
If an upgrade is not possible, the following actions can mitigate the vulnerabilities:
* Utilize a firewall to restrict access to the rtserver or TipcConnAccept port to trusted sources. * Use a user with restricted privileges to invoke the server or application. * Invoke the server or application from a chroot environment. This will restrict the ability to access or modify information in the event of a successful exploit.
---------------------------------------------------------------------- TIBCO would like to extend its appreciation to McSlibin and Sean Larsson (iDefense Labs) for discovery of these vulnerabilities, which have been addressed in the 4.0.4 release. ----------------------------------------------------------------------
Issue/Introduction
Security Advisory for SmartSockets Product Family (RTworks)
Environment
Product: TIBCO SmartSockets Product Family (RTworks)
Version: 4.0.x
OS:
--------------------
Resolution
TIBCO SmartSockets Product Family (RTworks) vulnerability
Original release date: January 15, 2008 Last revised: -- Source: TIBCO Software Inc.
Systems Affected
TIBCO SmartSockets Product Family (RTworks) versions below 4.0.4
The following components are affected:
* TIBCO RTworks Server (rtserver) * TIBCO RTworks Data Archive Process (rtarchive) * TIBCO RTworks Data Playback Process (rtplayback) * TIBCO RTworks Data Acquisition Process (rtdaq) * TIBCO RTworks Human Computer Interface (rthci) * TIBCO RTworks Inference Engine (rtie) * TIBCO RTworks libraries (rtipc, rtutil)
Overview
TIBCO RTworks components listed above contain buffer overflow vulnerabilities in the processing of inbound data. The impact of these vulnerabilities may include remote execution of arbitrary code, information disclosure, and denial of service.
I. Description
TIBCO has released updates which address critical vulnerabilities in the server and library components of the TIBCO RTworks.
These vulnerabilities directly affect the RTworks server (rtserver) and applications utilizing the TipcConnAccept interface. These vulnerabilities may also affect applications utilizing the RTworks libraries if an attacker is able to inject data into the server/client TCP connection.
TIBCO strongly recommends sites running the affected components to install the update or take mitigating action as appropriate.
II. Impact
The impact of these vulnerabilities varies depending on the operating system and the privilege levels of the user that invokes the server or application.
The successful exploit will allow arbitrary code execution with the privileges of the user that invoked the server or application.
III. Solution
Upgrade TIBCO RTworks to version 4.0.4 or above. This is strongly recommended.
If an upgrade is not possible, the following actions can mitigate the vulnerabilities:
* Utilize a firewall to restrict access to the rtserver or TipcConnAccept port to trusted sources. * Use a user with restricted privileges to invoke the server or application. * Invoke the server or application from a chroot environment. This will restrict the ability to access or modify information in the event of a successful exploit.
---------------------------------------------------------------------- TIBCO would like to extend its appreciation to McSlibin and Sean Larsson (iDefense Labs) for discovery of these vulnerabilities, which have been addressed in the 4.0.4 release. ----------------------------------------------------------------------