Risk | High |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2016-3628 |
CWE-ID | CWE-120 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
EMS Appliance Client/Desktop applications / Office applications Enterprise Message Service Client/Desktop applications / Office applications |
Vendor | TIBCO |
Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU12307
Risk: High
CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-3628
CWE-ID:
CWE-120 - Buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated attacker to cause DoS condition or execute arbitrary code on the target system.
The weakness exists in tibemsd in the server due to buffer overflow. A remote attacker can submit specially crafted inbound data, trigger memory corruption, cause the service to crash or execute arbitrary code.
Successful exploitation of the vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate TIBCO Enterprise Message Service (EMS) to 8.3.0 and EMS Appliance to 2.4.0.
Vulnerable software versionsEMS Appliance: 2.3.0
Enterprise Message Service : 8.2.0 - 8.2.2
External linkshttp://www.tibco.com/sites/tibco/files/2017-01/2016-001-advisory.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to trick the victim to visit a specially crafted website or open a file.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.