First published: Tue Apr 08 2014(Updated: )
Buffer overflow in the Rendezvous Daemon (rvd), Rendezvous Routing Daemon (rvrd), Rendezvous Secure Daemon (rvsd), and Rendezvous Secure Routing Daemon (rvsrd) in TIBCO Rendezvous before 8.4.2, Messaging Appliance before 8.7.1, and Substation ES before 2.8.1 allows remote attackers to execute arbitrary code by leveraging access to a directly connected client and transmitting crafted data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TIBCO Rendezvous | <=8.4.1 | |
TIBCO Rendezvous | =7.4.11 | |
TIBCO Rendezvous | =7.5.1 | |
TIBCO Rendezvous | =7.5.2 | |
TIBCO Rendezvous | =7.5.3 | |
TIBCO Rendezvous | =7.5.4 | |
TIBCO Rendezvous | =8.2.1 | |
TIBCO Rendezvous | =8.3.0 | |
TIBCO Rendezvous | =8.3.1 | |
TIBCO Rendezvous | =8.10 | |
TIBCO Substation ES | <=2.8.0 | |
Tibco Messaging Appliance | <=8.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2543 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2014-2543, update TIBCO Rendezvous to version 8.4.2 or later, Messaging Appliance to version 8.7.1 or later, and Substation ES to version 2.8.1 or later.
CVE-2014-2543 affects multiple versions of TIBCO Rendezvous, Messaging Appliance, and Substation ES prior to their respective patched versions.
The risks include unauthorized remote execution of arbitrary code, potentially allowing attackers to compromise the affected systems.
CVE-2014-2543 is considered a significant vulnerability due to its wide scope of impact on critical messaging and routing components.