Bug 1310647 (CVE-2016-2510)
Summary: | CVE-2016-2510 bsh2: remote code execution via deserialization | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Andrej Nemec <anemec> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aileenc, alazarot, asantos, aszczucz, brms-jira, carnil, chazlett, dandread, dgutierr, etirelli, fnasser, gvarsami, huwang, janstey, jbpapp-maint, jcoleman, jochrist, jolee, jshepherd, kconner, ldimaggi, lgao, lpetrovi, manstis, mbaluch, mbiarnes, miburman, mwinkler, myarboro, nwallace, rrajasek, rwagner, rzhang, slong, smcgowan, soa-p-jira, spinder, tcunning, theute, tkirby, twalsh, vhalbert |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
See Also: |
https://issues.redhat.com/browse/ENTESB-10591 https://issues.redhat.com/browse/ENTESB-5380 |
||
Whiteboard: | |||
Fixed In Version: | bsh2 2.0b6 | Doc Type: | Bug Fix |
Doc Text: |
A deserialization flaw allowing remote code execution was found in the BeanShell library. If BeanShell was on the classpath, it could permit code execution if another part of the application deserialized objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the BeanShell library.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-06-08 02:48:29 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1310940, 1310946, 1312170, 1312171, 1312172, 1312173, 1312174, 1312175, 1312176, 1312177, 1329398, 1329400, 1329401, 1329402 | ||
Bug Blocks: | 1310650, 1335310, 1340536, 1379523, 1381801, 1385169 |
Description
Andrej Nemec
2016-02-22 12:25:56 UTC
This issue has been addressed in the following products: Red Hat JBoss BPM Suite 6.2.2 Via RHSA-2016:0539 https://rhn.redhat.com/errata/RHSA-2016-0539.html This issue has been addressed in the following products: Red Hat JBoss BRMS 6.2.2 Via RHSA-2016:0540 https://rhn.redhat.com/errata/RHSA-2016-0540.html This issue has been addressed in the following products: Red Hat JBoss Data Virtualization security and bug fix update Via RHSA-2016:1135 https://access.redhat.com/errata/RHSA-2016:1135 This issue has been addressed in the following products: Red Hat JBoss SOA Platform 5.3.1 Via RHSA-2016:1376 https://access.redhat.com/errata/RHSA-2016:1376 This issue has been addressed in the following products: Red Hat JBoss Fuse 6.3 Via RHSA-2016:2035 https://rhn.redhat.com/errata/RHSA-2016-2035.html This issue has been addressed in the following products: Red Hat Fuse 7.3.1 Via RHSA-2019:1545 https://access.redhat.com/errata/RHSA-2019:1545 |