Tuesday, January 15, 2008

[NT] TIBCO SmartSockets RTserver Heap Overflow Vulnerability

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html


- - - - - - - - -

TIBCO SmartSockets RTserver Heap Overflow Vulnerability
------------------------------------------------------------------------


SUMMARY

<http://www.tibco.com/software/messaging/smartsockets/> TIBCO
SmartSockets is "a message passing framework used to transport messages
over disparate channels. The RTserver is the server component of the
framework". Remote exploitation of a heap overflow vulnerability in TIBCO
Software Inc.'s SmartSockets RTserver may allow an attacker to crash the
service or execute arbitrary code with SYSTEM privileges.

DETAILS

Vulnerable Systems:
* TIBCO SmartSockets version 6.8.0

A heap overflow vulnerability exists within the code responsible for
processing requests. Two distinct values from the request are used for the
allocation size and the amount of data copied. Since both values are
attacker controlled, this can lead to a heap overflow, potentially
resulting in the execution of arbitrary code.

Analysis:
Exploitation allows an attacker to execute arbitrary code with SYSTEM
privileges. Unsuccessful attempts will likely crash the RTserver. The
service does not restart, which makes repeated exploitation attempts more
difficult.

The RTserver is the core component of the SmartSockets framework. Without
it, applications will be unable to pass messages.

Vendor response:
TIBCO has addressed this vulnerability by releasing new versions of their
software. For more information, consult their advisory at the following
URL: <http://www.tibco.com/mk/advisory.jsp>

http://www.tibco.com/mk/advisory.jsp

CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5658>
CVE-2007-5658

Disclosure Timeline:
10/23/2007 - Initial vendor notification
12/04/2007 - Second vendor notification
12/05/2007 - Initial vendor response
01/15/2008 - Coordinated public disclosure


ADDITIONAL INFORMATION

The information has been provided by iDefense Labs.
The original article can be found at:
<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=638>

http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=638

========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

No comments:

Post a Comment