---------------------------------------------------------------------- Secunia is pleased to announce the release of the annual Secunia report for 2008. Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/ Stay Secure, Secunia ---------------------------------------------------------------------- TITLE: TIBCO SmartSockets Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA34911 VERIFY ADVISORY: http://secunia.com/advisories/34911/ DESCRIPTION: A vulnerability has been reported in TIBCO SmartSockets, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an unspecified error when processing UDP requests. This can be exploited to cause a stack-based buffer overflow via a specially crafted UDP request. Successful exploitation allows execution of arbitrary code. The vulnerability affects the following products and versions: * TIBCO SmartSockets prior to versions 6.8.2 * TIBCO SmartSockets Product Family (RTworks) versions prior to 4.0.5 * TIBCO Enterprise Message Service (EMS) versions 4.0.0 through 5.1.1 SOLUTION: Update to the latest versions. * TIBCO SmartSockets version 6.8.2 * TIBCO SmartSockets Product Family (RTworks) version 4.0.5 * TIBCO Enterprise Message Service (EMS) version 5.1.2. PROVIDED AND/OR DISCOVERED BY: Stephen Fewer of Harmony Security ORIGINAL ADVISORY: TIBCO: http://www.tibco.com/multimedia/security_advisory_smartsockets_tcm8-7560.txt http://www.tibco.com/multimedia/security_advisory_rtworks_tcm8-7559.txt http://www.tibco.com/multimedia/security_advisory_ems_tcm8-7558.txt iDefense: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=785 Harmony Security: http://www.harmonysecurity.com/blog/2009/04/tibco-smartsockets-stack-buffer.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------