|
|
|
|
| |
Credit:
The information has been provided by Stephen Fewer.
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/
|
| |
Vulnerable Systems:
* SmartSockets RTserver version 4.0.10.1
Exploitation of this vulnerability results in the execution of arbitrary code with the privileges of the affected service, usually SYSTEM. No authentication is required to exploit this vulnerability. Since the vulnerability is a stack based buffer overflow, and there are no stack cookies, reliable exploitation is trivial.
Workaround
* Disable the rtserver UDP port if it has been enabled in the rtserver configuration file.
* Utilize a firewall to restrict access to the rtserver.
* Use a user with restricted privileges to invoke the rtserver or application.
* On Unix systems, invoke the server or application from a chroot environment. This will restrict the ability to access or modify information in the event of a successful exploit.
Patch Availability:
TIBCO has released a patch which addresses this issue. For more information, consult their advisory at the following URL:
http://www.tibco.com/services/support/advisories/default.jsp
CVE Information:
CVE-2009-1291
Disclosure Timeline:
03/18/2009 - Initial Contact
03/18/2009 - PoC Requested
03/25/2009 - PoC Sent
03/30/2009 - Vendor PoC ACK
04/07/2009 - Vendor Validated
04/10/2009 - Coordination
04/14/2009 - CVE from Vendor
04/14/2009 - Coordination
04/28/2009 - Coordinated Public Disclosure
|
|
|
|
|