Wednesday, January 16, 2008

[NT] TIBCO SmartSockets RTServer Multiple Untrusted Pointer Vulnerabilities

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html


- - - - - - - - -

TIBCO SmartSockets RTServer Multiple Untrusted Pointer Vulnerabilities
------------------------------------------------------------------------


SUMMARY

<http://www.tibco.com/software/messaging/smartsockets/> TIBCO
SmartSockets is "a message passing framework used to transport messages
over disparate channels. The RTserver is the server component of the
framework". Remote exploitation of multiple untrusted pointer
vulnerabilities in TIBCO Software Inc.'s SmartSockets RTserver may allow
an attacker to crash the service or execute arbitrary code with SYSTEM
privileges.

DETAILS

Vulnerable Systems:
* TIBCO SmartSockets version 6.8.0

When processing requests, SmartSockets uses values from the requests as
pointers. These pointer values are then used in various memory operations.
Since attackers can control these values, potentially exploitable
conditions arise.

Analysis:
Exploitation allows an attacker to execute arbitrary code with SYSTEM
privileges. Unsuccessful attempts will likely crash the RTserver. The
service does not restart, which makes repeated exploitation attempts more
difficult.

The RTserver is the core component of the SmartSockets framework. Without
it, applications will be unable to pass messages. The severity of these
issues will likely vary depending on the the application using the
SmartSockets framework.

Vendor response:
TIBCO has addressed these vulnerabilities by releasing new versions of
their software. For more information, consult their advisory at the
following URL: <http://www.tibco.com/mk/advisory.jsp>

http://www.tibco.com/mk/advisory.jsp

CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5655>
CVE-2007-5655

Disclosure Timeline:
10/23/2007 - Initial vendor notification
12/04/2007 - Second vendor notification
12/05/2007 - Initial vendor response
01/15/2008 - Coordinated public disclosure


ADDITIONAL INFORMATION

The information has been provided by iDefense Labs.
The original article can be found at:
<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=639>

http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=639

========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

No comments:

Post a Comment