A flaw was found in the way JBoss RichFaces handled deserialization. A remote attacker could use this flaw to trigger the execution of the deserialization methods in any serializable class deployed on the server. This could lead to a variety of security impacts depending on the deserialization logic of these classes.
This issue has been addressed in following products: Red Hat JBoss Web Framework Kit 2.3.0 Via RHSA-2013:1041 https://rhn.redhat.com/errata/RHSA-2013-1041.html
This issue has been addressed in following products: JBEWP 5 for RHEL 6 JBEWP 5 for RHEL 5 JBEWP 5 for RHEL 4 Via RHSA-2013:1043 https://rhn.redhat.com/errata/RHSA-2013-1043.html
This issue has been addressed in following products: JBEAP 5 for RHEL 6 JBEAP 5 for RHEL 5 JBEAP 5 for RHEL 4 Via RHSA-2013:1042 https://rhn.redhat.com/errata/RHSA-2013-1042.html
This issue has been addressed in following products: Red Hat JBoss Enterprise Application Platform 4.3.0 CP10 Red Hat JBoss Enterprise Application Platform 5.2.0 Red Hat JBoss Web Platform 5.2.0 Red Hat JBoss BRMS 5.3.1 Red Hat JBoss SOA Platform 4.3.0 CP05 Red Hat JBoss SOA Platform 5.3.1 Red Hat JBoss Portal 4.3 CP07 Red Hat JBoss Portal 5.2.2 Red Hat JBoss Operations Network 2.4.2 Red Hat JBoss Operations Network 3.1.2 Via RHSA-2013:1045 https://rhn.redhat.com/errata/RHSA-2013-1045.html
This issue has been addressed in following products: JBEAP 4.3.0 for RHEL 4 JBEAP 4.3.0 for RHEL 5 Via RHSA-2013:1044 https://rhn.redhat.com/errata/RHSA-2013-1044.html