First published: Tue Sep 14 2010(Updated: )
The drools serialization format allows to embed class files. Upon deserialization those are loaded by the VM that runs the drools engine. If that (attacker-controlled) class files defines code in a static initializer it is executed during deserialization.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | =4.3.0-cp06 | |
JBoss Enterprise Application Platform | =4.3.0 | |
JBoss Enterprise Application Platform | =4.3.0-cp01 | |
JBoss Enterprise Application Platform | =4.3.0-cp04 | |
JBoss Enterprise Application Platform | =4.3.0-cp07 | |
JBoss Enterprise Application Platform | =4.3.0-cp03 | |
JBoss Enterprise Application Platform | =4.3.0-cp02 | |
JBoss Enterprise Application Platform | =4.3.0-cp08 | |
JBoss Enterprise Application Platform | =4.3.0-cp05 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-tp02 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0-cp02 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0-cp01 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-cp05 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-cp04 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0-cp04 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-cp01 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-cp03 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0 | |
Red Hat JBoss Enterprise SOA Platform | =4.3.0-cp03 | |
Red Hat JBoss Enterprise SOA Platform | =4.2.0-cp02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3708 has been assigned a moderate severity rating due to the risks associated with deserialization of attacker-controlled class files.
To mitigate CVE-2010-3708, upgrade to a patched version of the Red Hat JBoss Enterprise Application Platform or SOA Platform if you are using an affected version.
CVE-2010-3708 affects multiple versions of Red Hat JBoss Enterprise Application Platform and Red Hat JBoss Enterprise SOA Platform, specifically version 4.3.0 and its various patch levels.
The attack vector for CVE-2010-3708 is via deserialization of malicious class files that can execute arbitrary code during the deserialization process.
Yes, CVE-2010-3708 is particularly relevant for production environments using vulnerable versions of JBoss, as it poses a risk of remote code execution.