First published: Sun Aug 30 2015(Updated: )
Buffer overflow in the HTTP administrative interface in TIBCO Rendezvous before 8.4.4, Rendezvous Network Server before 1.1.1, Substation ES before 2.9.0, and Messaging Appliance before 8.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors, related to the Rendezvous Daemon (rvd), Routing Daemon (rvrd), Secure Daemon (rvsd), Secure Routing Daemon (rvsrd), Gateway Daemon (rvgd), Daemon Adapter (rvda), Cache (rvcache), Agent (rva), and Relay Agent (rvrad) components.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tibco Messaging Appliance | <=8.7.1 | |
TIBCO Rendezvous | <=8.4.3 | |
TIBCO Rendezvous Network Server | <=1.1.0 | |
TIBCO Substation ES | <=2.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4555 has a high severity rating as it can lead to denial of service and potential arbitrary code execution.
To fix CVE-2015-4555, you should update TIBCO Rendezvous, Rendezvous Network Server, Substation ES, or Messaging Appliance to the patched versions available after the vulnerabilities were disclosed.
CVE-2015-4555 affects TIBCO Rendezvous versions up to 8.4.3, Rendezvous Network Server up to 1.1.0, Substation ES up to 2.8.1, and Messaging Appliance up to 8.7.1.
Yes, CVE-2015-4555 can be exploited remotely by attackers targeting the vulnerable HTTP administrative interface.
The potential impacts of CVE-2015-4555 include denial of service and the possibility of arbitrary code execution on the affected systems.