- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html
- - - - - - - - -
TIBCO SmartSockets RTserver Multiple Untrusted Pointer Offset
Vulnerabilities
------------------------------------------------------------------------
SUMMARY
<http://www.tibco.com/software/messaging/smartsockets/> TIBCO
SmartSockets is "a message passing framework used to transport messages
over disparate channels. The RTserver is the server component of the
framework". Remote exploitation of multiple untrusted pointer offset
vulnerabilities in TIBCO Software Inc.'s SmartSockets RTserver may allow
an attacker to crash the service or execute arbitrary code with SYSTEM
privileges.
DETAILS
Vulnerable Systems:
* TIBCO SmartSockets version 6.8.0
When processing requests, SmartSockets uses values from the requests as
offsets added to valid pointers. The resulting pointer values are then
used in various memory operations. Since attackers can control these
offset values, potentially exploitable conditions arise.
Analysis:
Exploitation allows an attacker to execute arbitrary code with SYSTEM
privileges. Unsuccessful attempts will likely crash the RTserver. The
service does not restart, which makes repeated exploitation attempts more
difficult.
The RTserver is the core component of the SmartSockets framework. Without
it, applications will be unable to pass messages. The severity of these
issues will likely vary depending on the the application using the
SmartSockets framework.
Vendor response:
TIBCO has addressed these vulnerabilities by releasing new versions of
their software. For more information, consult their advisory at the
following URL: <http://www.tibco.com/mk/advisory.jsp>
http://www.tibco.com/mk/advisory.jsp
CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5657>
CVE-2007-5657
Disclosure timeline:
10/23/2007 - Initial vendor notification
12/04/2007 - Second vendor notification
12/05/2007 - Initial vendor response
01/15/2008 - Coordinated public disclosure
ADDITIONAL INFORMATION
The information has been provided by iDefense Labs.
The original article can be found at:
<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=640>
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=640
========================================
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com
====================
====================
DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
No comments:
Post a Comment