- Description
- Multiple unspecified vulnerabilities in TIBCO Rendezvous 8.2.1 through 8.3.0, Enterprise Message Service (EMS) 5.1.0 through 6.0.0, Runtime Agent (TRA) 5.6.2 through 5.7.0, Silver BPM Service before 1.0.4, Silver CAP Service vebefore 1.0.2, and Silver BusinessWorks Service 1.0.0, when running on Unix systems, allow local users to gain root privileges via unknown vectors related to SUID and (1) Rendezvous Routing Daemon (rvrd), (2) Rendezvous Secure Daemon (rvsd), (3) Rendezvous Secure Routing Daemon (rvsrd), and (4) EMS Server (tibemsd).
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
- Hype score
- Not currently trending
- Comment
- Per: http://www.tibco.com/multimedia/rv_ems_security_advisory_20110201_tcm8-13185.txt 'TIBCO Rendezvous and EMS components listed above contain a SUID vulnerability which could potentially grant unauthorized root access to an attacker on Unix-based systems.'
- Impact
- Per: http://www.tibco.com/multimedia/rv_ems_security_advisory_20110201_tcm8-13185.txt 'On Unix-based systems a successful attack will result in a privilege escalation to root, granting the attacker full administrative control of the host.'
- Solution
- Per: http://www.tibco.com/multimedia/rv_ems_security_advisory_20110201_tcm8-13185.txt 'On Unix-based systems a successful attack will result in a privilege escalation to root, granting the attacker full administrative control of the host.'
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:rendezvous:8.2.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F0710D6E-07FF-49D9-82D1-028BF906AF01"
},
{
"criteria": "cpe:2.3:a:tibco:rendezvous:8.3.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "34040A6F-6C22-4011-A3F3-AD2F38CC468F"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:enterprise_message_service:5.1.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F468D346-2F24-4110-80B6-5CBD315A2512"
},
{
"criteria": "cpe:2.3:a:tibco:enterprise_message_service:5.1.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "42F68C2C-7225-4C40-8007-BE7EB1314DA4"
},
{
"criteria": "cpe:2.3:a:tibco:enterprise_message_service:6.0.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "74DBD571-4FF4-4BE8-9916-5D377973A9B7"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:runtime_agent:5.6.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2BFC4B07-1F93-4FAD-BCD9-7F43A4F6EF22"
},
{
"criteria": "cpe:2.3:a:tibco:runtime_agent:5.7.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B7618B53-911E-4746-B2C2-AD25A369042C"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:silver_bpm_service:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D30468F9-43C5-4DB6-B9E8-B35CB83E84EB",
"versionEndIncluding": "1.0.3"
},
{
"criteria": "cpe:2.3:a:tibco:silver_bpm_service:1.0.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CF339B05-7165-4D1B-BB4B-DB72E7D1A0F9"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:silver_cap_service:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5658A988-61B8-4B19-A2AA-09305CBD4E3B",
"versionEndIncluding": "1.0.1"
},
{
"criteria": "cpe:2.3:a:tibco:silver_cap_service:1.0.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5E886566-E2FF-4453-8400-DEE39E3852DC"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tibco:silver_businessworks_service:1.0.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3BD0099C-BB54-4AEF-AC04-DDF49B335AF6"
}
],
"operator": "OR"
}
]
}
]