Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Gain root remotely --> Category: infos

Rendezvous HTTP Interface Buffer Overflow Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Checks version number in Rendezvous' HTTP banner

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote server is prone to a buffer overflow attack.

Description :

The remote host appears to be running Rendezvous, a commercial
messaging software product used for building distributed applications

According to its banner, several of the components in the version of
Rendezvous installed on the remote host contain a buffer overflow
vulnerability in the HTTP administrative interface that may allow
arbitrary code execution subject to the rights of the user that
invoked the daemon, or 'nobody' in the case the remote system is
'unix' and the invoking user was 'root'.

See also :

http://www.tibco.com/resources/mk/rendezvous_security_advisory.txt
http://www.kb.cert.org/vuls/id/999884

Solution :

Upgrade to Rendezvous 7.5.1 or later.

Threat Level:

High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.