First published: Fri Aug 03 2007(Updated: )
The default configuration of TIBCO Rendezvous (RV) 7.5.2 clients, when -no-multicast is omitted, uses a multicast group as the destination for a network message, which might make it easier for remote attackers to capture message contents by sniffing the network.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TIBCO Rendezvous | =7.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4160 is marked as medium severity due to its potential for data interception.
To fix CVE-2007-4160, ensure that the -no-multicast option is enabled in the TIBCO Rendezvous configuration.
CVE-2007-4160 specifically affects TIBCO Rendezvous version 7.5.2.
CVE-2007-4160 allows remote attackers to potentially capture message contents by sniffing network traffic.
Yes, a workaround for CVE-2007-4160 includes properly configuring TIBCO Rendezvous to disable multicast traffic.