Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-1777

Опубликовано: 01 июл. 2013
Источник: redhat
CVSS2: 5.1

Описание

The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.

Отчет

Not affected. This flaw does not affect Apache Geronimo as shipped with various Red Hat products, as the affected subsystem is not included in these products.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5geronimo-specsNot affected
Red Hat Enterprise Linux 5java-1.7.0-openjdkNot affected
Red Hat Enterprise Linux 5mx4jNot affected
Red Hat Enterprise Linux 6geronimo-specsNot affected
Red Hat Enterprise Linux 6java-1.7.0-openjdkNot affected
Red Hat Enterprise Linux 6mx4jNot affected
Red Hat Enterprise Linux 7java-1.7.0-openjdkNot affected

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=984057geronimo: Improper RMI classloader implementation in JMX remoting functionality leading to arbitrary code execution

5.1 Medium

CVSS2

Связанные уязвимости

nvd
больше 12 лет назад

The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serialized object.

github
больше 3 лет назад

Apache Geronimo JMX Remoting functionality allows remote code execution in 3.x before v3.0.1

5.1 Medium

CVSS2