// For flags

CVE-2007-5657

 

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

TIBCO SmartSockets RTserver 6.8.0 and earlier, RTworks before 4.0.4, and Enterprise Message Service (EMS) 4.0.0 through 4.4.1 allows remote attackers to execute arbitrary code via crafted requests containing values that are used as pointer offsets.

TIBCO SmartSockets RTserver 6.8.0 y anteriores, RTworks anterior a 4.0.4, y Enterprise Message Service (EMS) 4.0.0 hasta el 4.4.1 permite a atacantes remotos ejecutar código de su elección a través de respuestas manipuladas que contienen valores que son utilizados como punteros de compensación.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-10-23 CVE Reserved
  • 2008-01-16 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-10-12 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Tibco
Search vendor "Tibco"
Enterprise Message Service
Search vendor "Tibco" for product "Enterprise Message Service"
*-
Affected
in Tibco
Search vendor "Tibco"
Ems Server
Search vendor "Tibco" for product "Ems Server"
*-
Safe
Tibco
Search vendor "Tibco"
Rtworks
Search vendor "Tibco" for product "Rtworks"
<= 4.0.3
Search vendor "Tibco" for product "Rtworks" and version " <= 4.0.3"
-
Affected
Tibco
Search vendor "Tibco"
Smartsockets Rtserver
Search vendor "Tibco" for product "Smartsockets Rtserver"
<= 6.8.0
Search vendor "Tibco" for product "Smartsockets Rtserver" and version " <= 6.8.0"
-
Affected