First published: Wed Jan 16 2008(Updated: )
Heap-based buffer overflow in TIBCO SmartSockets RTserver 6.8.0 and earlier, RTworks before 4.0.4, and Enterprise Message Service (EMS) 4.0.0 through 4.4.1 allows remote attackers to execute arbitrary code via crafted requests containing size and copy-length values that trigger the overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TIBCO Enterprise Message Service | =4.0.0 | |
TIBCO Enterprise Message Service | =4.1.0 | |
TIBCO Enterprise Message Service | =4.2.0 | |
TIBCO Enterprise Message Service | =4.3.0 | |
TIBCO Enterprise Message Service | =4.4.0 | |
TIBCO Enterprise Message Service | =4.4.1 | |
Tibco Rtworks | <=4.0.3 | |
TIBCO SmartSockets RTserver | <=6.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5658 has a high severity rating due to its potential for remote code execution.
To fix CVE-2007-5658, upgrade TIBCO SmartSockets RTserver to version 6.9.0 or later and TIBCO Enterprise Message Service to version 4.4.2 or later.
CVE-2007-5658 affects TIBCO SmartSockets RTserver versions up to 6.8.0 and TIBCO Enterprise Message Service versions 4.0.0 through 4.4.1.
Yes, CVE-2007-5658 can be exploited remotely through crafted requests that trigger a heap-based buffer overflow.
The potential consequences of CVE-2007-5658 include arbitrary code execution, which can compromise system integrity and confidentiality.