{"api_version":"1","generated_at":"2026-04-23T13:25:04+00:00","cve":"CVE-2015-4555","urls":{"html":"https://cve.report/CVE-2015-4555","api":"https://cve.report/api/cve/CVE-2015-4555.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2015-4555","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2015-4555"},"summary":{"title":"CVE-2015-4555","description":"Buffer overflow in the HTTP administrative interface in TIBCO Rendezvous before 8.4.4, Rendezvous Network Server before 1.1.1, Substation ES before 2.9.0, and Messaging Appliance before 8.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors, related to the Rendezvous Daemon (rvd), Routing Daemon (rvrd), Secure Daemon (rvsd), Secure Routing Daemon (rvsrd), Gateway Daemon (rvgd), Daemon Adapter (rvda), Cache (rvcache), Agent (rva), and Relay Agent (rvrad) components.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2015-08-30 14:59:00","updated_at":"2016-12-08 18:52:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"http://www.tibco.com/assets/blt18493dc775c50c09/2015-002-advisory.txt","name":"http://www.tibco.com/assets/blt18493dc775c50c09/2015-002-advisory.txt","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"TIBCO Security Advisory: August 25, 2015 - TIBCO Rendezvous® | TIBCO Software","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.tibco.com/mk/advisory.jsp","name":"http://www.tibco.com/mk/advisory.jsp","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"Advisory | TIBCO Software","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.securitytracker.com/id/1033677","name":"1033677","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"TIBCO Rendezvous Buffer Overflows Let Remote Users Deny Service or Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2015-4555","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4555","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2015","cve_id":"4555","vulnerable":"1","versionEndIncluding":"8.7.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tibco","cpe5":"messaging_appliance","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4555","vulnerable":"1","versionEndIncluding":"8.4.3","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tibco","cpe5":"rendezvous","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4555","vulnerable":"1","versionEndIncluding":"1.1.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tibco","cpe5":"rendezvous_network_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"4555","vulnerable":"1","versionEndIncluding":"2.8.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"tibco","cpe5":"substation_es","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2015-4555","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Buffer overflow in the HTTP administrative interface in TIBCO Rendezvous before 8.4.4, Rendezvous Network Server before 1.1.1, Substation ES before 2.9.0, and Messaging Appliance before 8.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors, related to the Rendezvous Daemon (rvd), Routing Daemon (rvrd), Secure Daemon (rvsd), Secure Routing Daemon (rvsrd), Gateway Daemon (rvgd), Daemon Adapter (rvda), Cache (rvcache), Agent (rva), and Relay Agent (rvrad) components."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"1033677","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033677"},{"name":"http://www.tibco.com/mk/advisory.jsp","refsource":"CONFIRM","url":"http://www.tibco.com/mk/advisory.jsp"},{"name":"http://www.tibco.com/assets/blt18493dc775c50c09/2015-002-advisory.txt","refsource":"CONFIRM","url":"http://www.tibco.com/assets/blt18493dc775c50c09/2015-002-advisory.txt"}]}},"nvd":{"publishedDate":"2015-08-30 14:59:00","lastModifiedDate":"2016-12-08 18:52:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tibco:rendezvous:*:*:*:*:*:*:*:*","versionEndIncluding":"8.4.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tibco:rendezvous_network_server:*:*:*:*:*:*:*:*","versionEndIncluding":"1.1.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tibco:messaging_appliance:*:*:*:*:*:*:*:*","versionEndIncluding":"8.7.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:tibco:substation_es:*:*:*:*:*:*:*:*","versionEndIncluding":"2.8.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2015","CveId":"4555","Ordinal":"81532","Title":"CVE-2015-4555","CVE":"CVE-2015-4555","Year":"2015"},"notes":[{"CveYear":"2015","CveId":"4555","Ordinal":"1","NoteData":"Buffer overflow in the HTTP administrative interface in TIBCO Rendezvous before 8.4.4, Rendezvous Network Server before 1.1.1, Substation ES before 2.9.0, and Messaging Appliance before 8.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors, related to the Rendezvous Daemon (rvd), Routing Daemon (rvrd), Secure Daemon (rvsd), Secure Routing Daemon (rvsrd), Gateway Daemon (rvgd), Daemon Adapter (rvda), Cache (rvcache), Agent (rva), and Relay Agent (rvrad) components.","Type":"Description","Title":null},{"CveYear":"2015","CveId":"4555","Ordinal":"2","NoteData":"2015-08-30","Type":"Other","Title":"Published"},{"CveYear":"2015","CveId":"4555","Ordinal":"3","NoteData":"2016-12-06","Type":"Other","Title":"Modified"}]}}}