Lucene search

K
tibcoCloud Software Group, Inc.TIBCO:-TIBCO-ENTERPRISE-MESSAGE-SERVICE--2021-28822
HistoryMar 22, 2021 - 5:05 p.m.

TIBCO Security Advisory: March 23, 2021 - TIBCO Enterprise Message Service -2021-28822

2021-03-2217:05:00
Cloud Software Group, Inc.
community.tibco.com
4

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

TIBCO Enterprise Message Service Windows Platform Artifact Search vulnerability

Original release date: March 23,2021
Last revised:
CVE-2021-28822
Source: TIBCO Software Inc.

Products Affected

TIBCO Enterprise Message Service versions 8.5.1 and below

TIBCO Enterprise Message Service - Community Edition versions 8.5.1 and
below

TIBCO Enterprise Message Service - Developer Edition versions 8.5.1 and
below

The following components are affected:

  • Enterprise Message Service Server (tibemsd)
  • Enterprise Message Service Central Administration (tibemsca)
  • Enterprise Message Service JSON configuration generator (tibemsconf2json)
  • Enterprise Message Service C API

Description

The components listed above contain a vulnerability that theoretically allows
a low privileged attacker with local access on the Windows operating system to
insert malicious software. The affected component can be abused to execute the
malicious software inserted by the attacker with the elevated privileges of
the component. This vulnerability results from the affected component
searching for run-time artifacts outside of the installation hierarchy.

Impact

The impact of this vulnerability includes the possibility of an attacker
gaining full access to the Windows operating system at the privilege level of
the affected component.

CVSS v3 Base Score: 8.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)

Solution

TIBCO has released updated versions of the affected systems which address this
issue:

TIBCO Enterprise Message Service versions 8.5.1 and below update to version
8.6.0 or higher

TIBCO Enterprise Message Service - Community Edition versions 8.5.1 and
below update to version 8.6.0 or higher

TIBCO Enterprise Message Service - Developer Edition versions 8.5.1 and
below update to version 8.6.0 or higher

Acknowledgments

TIBCO would like to extend its appreciation to Will Dormann of CERT/CC for
discovery of this vulnerability.

References

http://www.tibco.com/services/support/advisories
CVE-2021-28822

The information on this page is being provided to you on an “AS IS” and “AS-AVAILABLE” basis. The issues described on this page mayor may not impact your system(s). TIBCO makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, INCLUDING, BUTNOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT TIBCO SHALL IN NO EVENT BE LIABLE FOR ANYDIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. The information on this page is being provided to you under the terms of yourlicense and/or services agreement with TIBCO, and may be used only for the purposes contemplated by the agreement. If you do not have such an agreement with TIBCO, this information is provided under the TIBCO.com Terms ofUse, and may be used only for the purposes contemplated by such Terms ofUse.

7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Related for TIBCO:-TIBCO-ENTERPRISE-MESSAGE-SERVICE--2021-28822