CVE-2011-0649
Published Feb 4, 2011
Last updated 7 years ago
Overview
- Description
- Multiple unspecified vulnerabilities in TIBCO Rendezvous 8.2.1 through 8.3.0, Enterprise Message Service (EMS) 5.1.0 through 6.0.0, Runtime Agent (TRA) 5.6.2 through 5.7.0, Silver BPM Service before 1.0.4, Silver CAP Service vebefore 1.0.2, and Silver BusinessWorks Service 1.0.0, when running on Unix systems, allow local users to gain root privileges via unknown vectors related to SUID and (1) Rendezvous Routing Daemon (rvrd), (2) Rendezvous Secure Daemon (rvsd), (3) Rendezvous Secure Routing Daemon (rvsrd), and (4) EMS Server (tibemsd).
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Evaluator
- Comment
- Per: http://www.tibco.com/multimedia/rv_ems_security_advisory_20110201_tcm8-13185.txt 'TIBCO Rendezvous and EMS components listed above contain a SUID vulnerability which could potentially grant unauthorized root access to an attacker on Unix-based systems.'
- Impact
- Per: http://www.tibco.com/multimedia/rv_ems_security_advisory_20110201_tcm8-13185.txt 'On Unix-based systems a successful attack will result in a privilege escalation to root, granting the attacker full administrative control of the host.'
- Solution
- Per: http://www.tibco.com/multimedia/rv_ems_security_advisory_20110201_tcm8-13185.txt 'On Unix-based systems a successful attack will result in a privilege escalation to root, granting the attacker full administrative control of the host.'
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tibco:rendezvous:8.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0710D6E-07FF-49D9-82D1-028BF906AF01" }, { "criteria": "cpe:2.3:a:tibco:rendezvous:8.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34040A6F-6C22-4011-A3F3-AD2F38CC468F" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tibco:enterprise_message_service:5.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F468D346-2F24-4110-80B6-5CBD315A2512" }, { "criteria": "cpe:2.3:a:tibco:enterprise_message_service:5.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42F68C2C-7225-4C40-8007-BE7EB1314DA4" }, { "criteria": "cpe:2.3:a:tibco:enterprise_message_service:6.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74DBD571-4FF4-4BE8-9916-5D377973A9B7" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tibco:runtime_agent:5.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BFC4B07-1F93-4FAD-BCD9-7F43A4F6EF22" }, { "criteria": "cpe:2.3:a:tibco:runtime_agent:5.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7618B53-911E-4746-B2C2-AD25A369042C" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tibco:silver_bpm_service:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D30468F9-43C5-4DB6-B9E8-B35CB83E84EB", "versionEndIncluding": "1.0.3" }, { "criteria": "cpe:2.3:a:tibco:silver_bpm_service:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF339B05-7165-4D1B-BB4B-DB72E7D1A0F9" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tibco:silver_cap_service:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5658A988-61B8-4B19-A2AA-09305CBD4E3B", "versionEndIncluding": "1.0.1" }, { "criteria": "cpe:2.3:a:tibco:silver_cap_service:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E886566-E2FF-4453-8400-DEE39E3852DC" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:tibco:silver_businessworks_service:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BD0099C-BB54-4AEF-AC04-DDF49B335AF6" } ], "operator": "OR" } ] } ]