First published: Tue Jul 22 2014(Updated: )
jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to execute arbitrary code via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat jboss enterprise application platform | =5.2.0 | |
Red Hat JBoss Enterprise BRMS Platform | =5.3.1 | |
Red Hat JBoss Portal | =5.2.2 | |
Red Hat JBoss Enterprise SOA Platform | =5.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3518 is considered to be of high severity due to its potential to allow remote code execution.
To fix CVE-2014-3518, upgrade to the latest versions of affected JBoss products as recommended by Red Hat.
CVE-2014-3518 affects JBoss Enterprise Application Platform 5.2.0, JBoss BRMS 5.3.1, JBoss Portal 5.2.2, and JBoss SOA Platform 5.3.1.
Yes, CVE-2014-3518 can be exploited remotely by attackers due to improper implementation of the JSR 160 specification.
If you are using an affected version related to CVE-2014-3518, you should prioritize upgrading to a patched version to mitigate the vulnerability.