The EjbObjectInputStream class in Apache TomEE before 1.7.4 and 7.x before 7.0.0-M3 allows remote attackers to execute arbitrary code via a crafted serialized object.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/136256/Apache-TomEE-Patched.html | Third Party Advisory VDB Entry |
http://tomee-openejb.979440.n4.nabble.com/Document-resolved-vulnerability-CVE-2015-8581-td4678073.html | Issue Tracking |
http://tomee.apache.org/security/tomee.html | Patch Vendor Advisory |
http://www.securityfocus.com/archive/1/537806/100/0/threaded | |
http://www.securityfocus.com/bid/79204 | Third Party Advisory VDB Entry |
http://www.zerodayinitiative.com/advisories/ZDI-15-638 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-04-11 16:59
Updated : 2024-02-28 15:44
NVD link : CVE-2016-0779
Mitre link : CVE-2016-0779
CVE.ORG link : CVE-2016-0779
JSON object : View
Products Affected
apache
- tomee
CWE
CWE-502
Deserialization of Untrusted Data