Remote code execution in TIBCO EMS



Published: 2016-04-19
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2016-3628
CWE-ID CWE-120
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
EMS Appliance
Client/Desktop applications / Office applications

Enterprise Message Service
Client/Desktop applications / Office applications

Vendor TIBCO

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Buffer overflow

EUVDB-ID: #VU12307

Risk: High

CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-3628

CWE-ID: CWE-120 - Buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote authenticated attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists in tibemsd in the server due to buffer overflow. A remote attacker can submit specially crafted inbound data, trigger memory corruption, cause the service to crash or execute arbitrary code.

Successful exploitation of the vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update TIBCO Enterprise Message Service (EMS) to 8.3.0 and EMS Appliance to 2.4.0.

Vulnerable software versions

EMS Appliance: 2.3.0

Enterprise Message Service : 8.2.0 - 8.2.2

External links

http://www.tibco.com/sites/tibco/files/2017-01/2016-001-advisory.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###