#VU12307 Buffer overflow in EMS Appliance and Enterprise Message Service


Published: 2018-04-30 | Updated: 2018-04-30

Vulnerability identifier: #VU12307

Vulnerability risk: High

CVSSv3.1: 8.6 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-3628

CWE-ID: CWE-120

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
EMS Appliance
Client/Desktop applications / Office applications
Enterprise Message Service
Client/Desktop applications / Office applications

Vendor: TIBCO

Description

The vulnerability allows a remote authenticated attacker to cause DoS condition or execute arbitrary code on the target system.

The weakness exists in tibemsd in the server due to buffer overflow. A remote attacker can submit specially crafted inbound data, trigger memory corruption, cause the service to crash or execute arbitrary code.

Successful exploitation of the vulnerability may result in complete compromise of vulnerable system.

Mitigation
Update TIBCO Enterprise Message Service (EMS) to 8.3.0 and EMS Appliance to 2.4.0.

Vulnerable software versions

EMS Appliance: 2.3.0

Enterprise Message Service : 8.2.0 - 8.2.2


External links
http://www.tibco.com/sites/tibco/files/2017-01/2016-001-advisory.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability