First published: Thu Apr 30 2009(Updated: )
Stack-based buffer overflow in TIBCO SmartSockets before 6.8.2, SmartSockets Product Family (aka RTworks) before 4.0.5, and Enterprise Message Service (EMS) 4.0.0 through 5.1.1, as used in SmartSockets Server and RTworks Server (aka RTserver), SmartSockets client libraries and add-on products, RTworks libraries and components, EMS Server (aka tibemsd), SmartMQ, iProcess Engine, ActiveMatrix products, and CA Enterprise Communicator, allows remote attackers to execute arbitrary code via "inbound data," as demonstrated by requests to the UDP interface of the RTserver component, and data injection into the TCP stream to tibemsd.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TIBCO Enterprise Message Service | <=5.1.1 | |
TIBCO Enterprise Message Service | =4.0.0 | |
TIBCO Enterprise Message Service | =4.1.0 | |
TIBCO Enterprise Message Service | =4.2.0 | |
TIBCO Enterprise Message Service | =4.3.0 | |
TIBCO Enterprise Message Service | =4.4.1 | |
TIBCO Enterprise Message Service | =4.4.2 | |
TIBCO RTWorks | =4.0.3 | |
TIBCO RTWorks | =4.0.4 | |
TIBCO SmartSockets RTserver | =6.8.0 | |
TIBCO SmartSockets RTserver | =6.8.1 | |
TIBCO SmartSockets RTserver | <=6.8.1 | |
TIBCO SmartSockets RTserver | =6.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1291 is classified as a high severity vulnerability due to the potential for a stack-based buffer overflow that can lead to arbitrary code execution.
To fix CVE-2009-1291, upgrade TIBCO SmartSockets to version 6.8.2 or later, TIBCO Enterprise Message Service to version 5.1.2 or later, and TIBCO RTworks to version 4.0.5 or later.
CVE-2009-1291 affects TIBCO SmartSockets prior to 6.8.2, TIBCO Enterprise Message Service versions 4.0.0 through 5.1.1, and TIBCO RTworks prior to 4.0.5.
Yes, there have been reports indicating that exploits for CVE-2009-1291 are actively being utilized in the wild.
Failure to address CVE-2009-1291 can lead to unauthorized code execution, data breaches, and potential system compromise.