First published: Wed Feb 15 2017(Updated: )
IBM Websphere MQ JMS 7.0.1, 7.1, 7.5, 8.0, and 9.0 client provides classes that deserialize objects from untrusted sources which could allow a malicious user to execute arbitrary Java code by adding vulnerable classes to the classpath. IBM Reference #: 1983457.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM WebSphere MQ | =7.0.1 | |
IBM WebSphere MQ | =7.1 | |
IBM WebSphere MQ | =7.5 | |
IBM WebSphere MQ | =8.0 | |
IBM WebSphere MQ | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0360 is rated as a high severity vulnerability due to the potential for remote code execution.
To mitigate CVE-2016-0360, upgrade to a non-vulnerable version of IBM WebSphere MQ JMS.
CVE-2016-0360 affects IBM WebSphere MQ JMS versions 7.0.1, 7.1, 7.5, 8.0, and 9.0.
Exploitation of CVE-2016-0360 can allow a malicious user to execute arbitrary Java code on the affected system.
The vendor for CVE-2016-0360 is IBM, associated with IBM WebSphere MQ.